Risk
7/21/2011
06:37 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Embedded Web Servers Exposing Organizations To Attack

Black Hat USA speaker's experimental Internet scan turns up multitude of unsecured copiers, scanners, VoIP systems, storage devices

A researcher who has been scanning the Internet for months looking for unsecured, embedded Web servers has found a bounty of digital scanners, office printers, VoIP systems, storage devices, and other equipment fully exposed and ripe for attack.

Click here for more of Dark Reading's Black Hat articles.

Michael Sutton, vice president of security research for Zscaler Labs, at Black Hat USA 2011 next month will demonstrate his findings: Ricoh and Sharp copiers, HP scanners, and Snom voice-over-IP (VoIP) phones were the most commonly discovered devices, all accessible via the Internet. "It was pretty shocking to me: Virtually none of these should be exposed to the Internet. There's not a good reason that an HP scanner should be exposed to the Net," Sutton says.

It's a recipe for disaster: Embedded Web servers with little or no security get misconfigured when they're installed. Most likely, the potential victims are small to midsize businesses or consumers with less technical expertise who misconfigure their devices and have no idea they're showing up online. "They're taking this device, plugging it into the wall, and making a mistake on a router or access point ... and suddenly things are exposed to the Web," he says.

Sutton used Amazon EC2 computing resources to constantly scan large blocks of addresses and to detect any embedded Web servers. Sharp and Ricoh copiers digitally archive past photocopies, he notes, so if that feature is enabled and the copier is sitting on the Net unsecured, an attacker could retrieve any previously photocopied documents, he says. Even the fax-forwarding feature in some HP scanners could be abused if the scanner were open to the Internet: An attacker could access any faxed documents to the user by having them forwarded to his fax machine, for example.

The Snom VoIP systems that Sutton found in his Internet scans could be vulnerable to eavesdropping or pilfered caller information. "Some of their VoIP systems have a kind of admin debugging/packet capture feature. If [the VoIP system is] accessible, you can log in, turn it on, capture traffic, download PCAPs ... and with Wireshark, you can eavesdrop on organizations," Sutton says.

Sutton plans to release a free, new tool he developed to help organizations scan for these types of vulnerable devices in their networks. Called BREWS, it's basically a Web-based and automated version of the scripts he wrote to scan for server headers.

He doesn't consider Google-hacking an easy or effective way to find embedded servers. Scanning for headers is a better approach, he says. "It worked really well because in hardware, headers are unique for a lot of these devices. The Canon photocopier has a return header with 'canon' in it," he says. "Embedded Web servers have different data than a standard Web server: They are very static and tend not to change. There are handful of server headers for HP printers and scanners," for instance, he says.

"The BREWS tool that I'm going to release ... automates what I did so you can scan your own network for embedded Web servers you were not aware of," Sutton says.

The tool also is aimed at gathering and compiling global fingerprint data on these embedded Web devices, he says. "We don't have good information to find these devices. Typically, security scanners focus on Web application servers, not on these" embedded ones, he says.

"We want to encourage people to scan their own networks ... and then it's submitted back to a centralized database, and we'll share the fingerprinting data," he says. Fingerprinting those devices has been difficult because many sit on LANs and can't be scanned externally, he says.

The risk of vulnerable embedded systems has been studied before, including HD Moore's research on VxWorks, the operating system found in many embedded systems. Moore, chief security officer at Rapid7 and chief architect of Metasploit, last year at Defcon and Security BSides showed how he had found hundreds of products connected to the Net that contain a diagnostics service or feature from VxWorks that leaves them susceptible to getting hacked. These devices include VoIP equipment and switches, DSL concentrators, industrial automation systems for SCADA environments, and Fibre Channel switches.

Those, too, were the result of a misconfiguration, but by the developers who used VxWorks. The diagnostics service for developers can be abused by an attacker if left either purposely or inadvertently active in the software. "The service allows access to read memory, write memory, and even power cycle the device. Combined, that is enough to steal data, backdoor the running firmware image, and otherwise take control over the device," Moore said in an interview on the research last year. "This feature shouldn't be enabled" in production mode, but instead deactivated, he says.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-4440
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 generates weak non-tty passwords, which makes it easier for context-dependent attackers to guess the password via a brute-force attack.

CVE-2013-4442
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 uses weak pseudo generated numbers when /dev/urandom is unavailable, which makes it easier for context-dependent attackers to guess the numbers.

CVE-2013-7401
Published: 2014-12-19
The parse_request function in request.c in c-icap 0.2.x allows remote attackers to cause a denial of service (crash) via a URI without a " " or "?" character in an ICAP request, as demonstrated by use of the OPTIONS method.

CVE-2014-2026
Published: 2014-12-19
Cross-site scripting (XSS) vulnerability in the search functionality in United Planet Intrexx Professional before 5.2 Online Update 0905 and 6.x before 6.0 Online Update 10 allows remote attackers to inject arbitrary web script or HTML via the request parameter.

CVE-2014-2716
Published: 2014-12-19
Ekahau B4 staff badge tag 5.7 with firmware 1.4.52, Real-Time Location System (RTLS) Controller 6.0.5-FINAL, and Activator 3 reuses the RC4 cipher stream, which makes it easier for remote attackers to obtain plaintext messages via an XOR operation on two ciphertexts.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.