Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


12:41 PM
Connect Directly

FAA's New Flight Control System Has Security Holes: Researcher

At the Black Hat conference, a computer scientist demonstrates how 'fake airplanes' can be inserted into FAA's upcoming air traffic control system.

Mission Intelligence: NRO's Newest Spy Satellites
Mission Intelligence: NRO's Newest Spy Satellites
(click image for larger view and for slideshow)
A key component of the FAA's emerging "Next Gen" air traffic control system is fundamentally insecure and ripe for manipulation and attack, security researcher Andrei Costin said in a presentation Wednesday at Black Hat 2012 in Las Vegas.

Costin, a computer scientist and graduate student at Eurecom, outlined a series of issues related to the Automatic Dependent Surveillance-Broadcast (ADS-B) system, which is being installed as a replacement to the decades-old ground radar system used to guide airplanes through the sky and on the ground at airports.

Among the threats to ADS-B is that the system lacks a capability for message authentication. "Any attacker can pretend to be an aircraft" by injecting a message into the system, Costin said.

There's also no mechanism in ADS-B for encrypting messages, so messages related to air traffic--including the ability to identify aircraft, their location, and altitude--can be read by virtually anyone, Costin said. He displayed an air traffic screen capture, taken this year, which ostensibly showed the in-flight location of Air Force One, the Boeing 747 used to transport President Obama.

[ Read about the Department of Defenses' plan to let unmanned aircraft share air space with commercial and private planes: Drones To Fly U.S. Skies, In DOD Plans. ]

If the aircraft was in fact Air Force One, the easy availability of that information would have national security implications. "It's a very high-profile target," said Costin. On the other hand, it's possible that the aircraft represented in the screen capture wasn't Air Force One, but another plane identified within ADS-B using Air Force One's registration code. "If the data is false, somebody is spoofing the system," said Costin.

Costin did not provide evidence of any known attacks on ADS-B. Rather, he presented a theoretical scenario in which someone injected the system with data on "fake planes," forcing the air traffic control system to adjust to aircraft that weren't actually in flight. He characterized such an attack at scale--with one million fake planes, for example—as comparable to a denial-of-service attack on the air traffic control system. Air traffic controllers might be forced to block off air space while they sorted out the mess, he said.

Costin demonstrated how an attack on ADS-B could be mounted using inexpensive software-defined radios. He took airplane data that was publicly available from the system, modified the data, and "replayed" the data back to a commercial receiver. "The possibility of injecting fake airplanes is quite easy, just by taking a real message and crafting it to your needs," he said.

There are also privacy issues, because data on private planes can be culled from ADS-B as well. By matching that data with aircraft registration databases, Costin explained, it would be possible to track non-commercial aircraft from city to city.

In a whitepaper accompanying his presentation, Costin wrote that the types of potential attacks on ADS-B range from passive attacks such as eavesdropping to active attacks, including message jamming and injections of the type he demonstrated.

In addition to the lack of encryption in ADS-B, the whitepaper identifies the following security weaknesses: no use of entity authentication as a way of protecting against message injection, or of message signatures to deter tampering; no challenge-response mechanisms to protect against replay attacks; and lack of "ephemeral identifiers" for privacy protection.

Questions over the security of the ADS-B system aren't new. Aviation experts have warned of vulnerabilities in the past, but the FAA has been reluctant to discuss them. In response to InformationWeek, the FAA, in a prepared statement, said it has "a thorough process in place" to identify possible risks to ADS-B, such as intentional jamming, and that it has taken steps to mitigate risks uncovered as part of an ADS-B security action plan. The agency declined to identify the risks it has identified or addressed, calling them "security-sensitive."

"The agency conducts ongoing assessments of ADS-B signal vulnerabilities," according to the statement. The FAA said the contract for the ADS-B ground station network requires ongoing independent validation of the accuracy and reliability of ADS-B and aircraft avionics signals. As a backup to ADS-B, the FAA plans to maintain about half of the current network of secondary radars "in the unlikely event it is needed."

Security information and event monitoring technology has been available for years, but the information can be hard to mine. In our SIEM Success report, we provide a step-by-step guide to make the most of your SIEM system. (Free registration required.)

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Embedded SW Dev
Embedded SW Dev,
User Rank: Apprentice
7/27/2012 | 6:56:52 PM
re: FAA's New Flight Control System Has Security Holes: Researcher
Tracking airplanes from city to city is something which is relatively easy to do now, as private airplanes use their registration numbers with air traffic control, and there are internet sites continuously recording/monitoring air traffic control conversations in real time. Tracking them in-flight can be made more difficult by requesting the FAA block flight tracking because of a security concern, which prevents operations like flightaware from displaying those tail numbers in real-time. The most effective way of preventing traffic is to fly VFR from airports without towers. This hole just prevents the FAA flight tracking block from being effective.

I agree that the other problems need to be addressed, as I really don't want to be flying when the FAA experiences a Denial of Service attack.
User Rank: Ninja
7/26/2012 | 7:43:18 PM
re: FAA's New Flight Control System Has Security Holes: Researcher
IGm so very thankful that there is demonstration where they show what exactly the vulnerabilities are in particular systems. FAAGs new flight system, very important system that should have no vulnerabilities what so ever! Being able to simulate planes that are not there and non-encrypted messages regarding flight information, are not vulnerabilities that make me feel safe at all! It doesnGt matter that there is no recorded attacks on this new system, if there is vulnerabilities then there will eventually be an attack if these are not taken care of and eliminated. In addition to all this, these threats are not new, and refused to identify other risks? Does anybody else feel like splitting gas money with me on the next tripGǪroad trip!

Paul Sprague
InformationWeek Contributor
SOC 2s & Third-Party Assessments: How to Prevent Them from Being Used in a Data Breach Lawsuit
Beth Burgin Waller, Chair, Cybersecurity & Data Privacy Practice , Woods Rogers PLC,  12/5/2019
Deliver a Deadly Counterpunch to Ransomware Attacks: 4 Steps
Mathew Newfield, Chief Information Security Officer at Unisys,  12/10/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Our Endpoint Protection system is a little outdated... 
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-12-11
Arbitrary command execution is possible in Git before 2.20.2, 2.21.x before 2.21.1, 2.22.x before 2.22.2, 2.23.x before 2.23.1, and 2.24.x before 2.24.1 because a "git submodule update" operation can run commands found in the .gitmodules file of a malicious repository.
PUBLISHED: 2019-12-10
All Samba versions 4.x.x before 4.9.17, 4.10.x before 4.10.11 and 4.11.x before 4.11.3 have an issue, where the (poorly named) dnsserver RPC pipe provides administrative facilities to modify DNS records and zones. Samba, when acting as an AD DC, stores DNS records in LDAP. In AD, the default permiss...
PUBLISHED: 2019-12-10
All Samba versions 4.x.x before 4.9.17, 4.10.x before 4.10.11 and 4.11.x before 4.11.3 have an issue, where the S4U (MS-SFU) Kerberos delegation model includes a feature allowing for a subset of clients to be opted out of constrained delegation in any way, either S4U2Self or regular Kerberos authent...
PUBLISHED: 2019-12-10
A flaw was found with the libssh API function ssh_scp_new() in versions before 0.9.3 and before 0.8.8. When the libssh SCP client connects to a server, the scp command, which includes a user-provided path, is executed on the server-side. In case the library is used in a way where users can influence...
PUBLISHED: 2019-12-10
A remote code execution vulnerability exists when Microsoft Windows OLE fails to properly validate user input, aka 'Windows OLE Remote Code Execution Vulnerability'.