Vulnerabilities / Threats //

Advanced Threats

8/7/2014
10:00 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

No Fixes In Sight For Satellite Terminal Flaws

At Black Hat USA, a researcher who in April revealed weaknesses in popular satellite ground terminal equipment found on air, land and sea, demonstrates possible attack scenarios.

BLACK HAT USA -- Las Vegas -- Back in April, when security researcher Ruben Santamarta first went public with serious security flaws in the firmware of satellite land equipment that could allow attackers to hijack and disrupt communications links to ships, airplanes, and military operations, only one of the affected vendors had responded to his findings.

Santamarta in a presentation on his research here Thursday at Black Hat USA said the satellite terminal vendors with gaping holes in their products have no plans to patch or fix the shortcomings, which include hardcoded passwords, backdoors, insecure protocols and undocumented protocols. Some contend that the issues are not flaws but acceptable features in their products. Santamarta reported his findings to the CERT Coordination Center, which then alerted the satellite vendors in January of this year.

Hughes, for example, stated that the digital backdoors are a "normal" and common practice in commercial products for retrieving lost or forgotten passwords, says Santamarta, principal security consultant with IOActive.

"I expected to find some security issues [with these devices] but the backdoors and ability to upload software without authentication, these things are very" serious, Santamarta told Dark Reading.

Specifically, he found that an attacker could completely compromise the systems, run malware, install malicious firmware and even send an SMS text to spoof the communication to a ship, for example. "They can spoof messages and trick the ship to follow a certain path, or to rescue another ship. They can disrupt communications... if a vessel can't send a distress signal, that's the worst scenario, if a ship can't communicate," Santamarta explained in an April interview after his initial findings were first published.

In the case of an airplane, the in-flight airline WiFi network is vulnerable to malicious behavior, he says, because the Cobham AVIATOR 700 satellite terminals sit on the WiFi network. The danger, he says, is an attacker gaining control over the Satellite Data Unit or the SwiftBroadband Unit interface by taking advantage of the weak password reset feature, hardcoded credentials or the insecure protocols in the AVIATOR 700.

"More specifically, a successful attack could compromise control of the satellite link channel used by the Future Air Navigation System (FANS), Controller Pilot Data Link Communications (CPDLC) or Aircraft Communications Addressing and Reporting System (ACARS). A malfunction of these subsystems could pose a safety threat for the entire aircraft," writes Santamarta in his white paper on the findings.

But "we're not crashing planes here," Santamarta says. Even so, disrupting ACARS messaging could pose a safety risk, he says.

Cobham said an attacker would need physical access, or the network would have to have been improperly installed, for the attack scenarios Santamarta presented. The company also said over-the-air communications requires user authentication, and hardcoded passwords cannot be used.

With any of the vulnerabilities in the various satellite terminals, the attackers would have to have some knowledge of the inherent firmware and its weaknesses, as well as how to exploit them.

Santamarta's findings mirror that of many other so-called embedded commercial systems. Billy Rios, director of threat intelligence at Qualys, here yesterday revealed his latest findings on Transportation Safety Administration (TSA) checkpoint systems, namely that the TSA's Kronos 4500 time clock system used by TSA agents to clock in and out with their fingerprints, contains two different hardcoded passwords that can only be changed by the vendor.

"A lot of embedded systems have lame vulnerabilities. Name your embedded system, it's going to have" some basic security weakness, says Marc Maiffret, CTO at BeyondTrust.

[From Google hacking to ATM "jackpotting" to the NSA -- Black Hat has had some memorable moments over the years. Read 10 Dramatic Moments In Black Hat History.]

Santamarta studied and reverse-engineered the firmware of satellite terminal equipment from Cobham, Hughes, Inmarsat, JRC, Iridium, and Thuraya. 

"If you have physical access to any of these devices, it's over," Santamarta says. "You can compromise all the devices" on that network, he says.

Security experts say hardcoded credentials in hardware is a recipe for disaster. "Using hard-coded username and passwords from hardware manufacturers without another layer of protection is security suicide," says Ken Balich, CISO at Authentify. "All of these vulnerabilities and breaches stem from two things:  failures in network security thinking to understand and counter emerging threats, and following the old adage 'I don't need more security until something happens.'  Unfortunately that's too late and many can pay a steep price."

Santamarta's full report is available here (PDF).

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
8/12/2014 | 12:29:38 PM
Re: distressing and depressing
Indeed! I do think, though, that this is a case where the good guys are trying to get ahead of the bad guys. Let's hope that the industry in question here gets the message and offers fixes before the bad guys start to figure this out.
Sara Peters
50%
50%
Sara Peters,
User Rank: Author
8/12/2014 | 12:19:58 PM
distressing and depressing
It's one thing when an organization is slow fixing vulnerabilities; it's another when they flat out say that they're not going to fix vulnerabilities. Or won't recognize that they're vulnerabilities.  Here's hoping that Ruben's findings really are worst case scenario and that they won't be manipulated by the bad guys.
Russia Hacked Clinton's Computers Five Hours After Trump's Call
Robert Lemos, Technology Journalist/Data Researcher,  4/19/2019
Why We Need a 'Cleaner Internet'
Darren Anstee, Chief Technology Officer at Arbor Networks,  4/19/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
The State of Ransomware
The State of Ransomware
Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find out what they had to say!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-10008
PUBLISHED: 2019-04-24
Zoho ManageEngine ServiceDesk 9.3 allows session hijacking and privilege escalation because an established guest session is automatically converted into an established administrator session when the guest user enters the administrator username, with an arbitrary incorrect password, in an mc/ login a...
CVE-2019-9950
PUBLISHED: 2019-04-24
Western Digital My Cloud, My Cloud Mirror Gen2, My Cloud EX2 Ultra, My Cloud EX2100, My Cloud EX4100, My Cloud DL2100, My Cloud DL4100, My Cloud PR2100 and My Cloud PR4100 firmware before 2.31.174 is affected by an authentication bypass vulnerability. The login_mgr.cgi file checks credentials agains...
CVE-2019-9951
PUBLISHED: 2019-04-24
Western Digital My Cloud, My Cloud Mirror Gen2, My Cloud EX2 Ultra, My Cloud EX2100, My Cloud EX4100, My Cloud DL2100, My Cloud DL4100, My Cloud PR2100 and My Cloud PR4100 firmware before 2.31.174 is affected by an unauthenticated file upload vulnerability. The page web/jquery/uploader/uploadify.php...
CVE-2018-10055
PUBLISHED: 2019-04-24
Invalid memory access and/or a heap buffer overflow in the TensorFlow XLA compiler in Google TensorFlow before 1.7.1 could cause a crash or read from other parts of process memory via a crafted configuration file.
CVE-2018-7577
PUBLISHED: 2019-04-24
Memcpy parameter overlap in Google Snappy library 1.1.4, as used in Google TensorFlow before 1.7.1, could result in a crash or read from other parts of process memory.