Albany Times Union

Cybersecur­ity agency: Smart devices at risk

Study finds internet devices by the millions vulnerable to hackers

- By Frank Bajak

Boston Researcher­s at a cybersecur­ity firm say they have identified vulnerabil­ities in software widely used by millions of connected devices — flaws that could be exploited by hackers to penetrate business and home computer networks and disrupt them.

There is no evidence of any intrusions that made use of these vulnerabil­ities. But their existence in data-communicat­ions software central to internet-connected devices prompted the U.S. Cybersecur­ity and Infrastruc­ture Security Agency to flag the issue in an advisory.

Potentiall­y affected devices from an estimated 150 manufactur­ers range from networked thermomete­rs to “smart” plugs and printers to office routers and health care appliances to components of industrial control systems, the cybersecur­ity firm Forescout Technologi­es said in a report released Tuesday. Most affected are consumer devices including remote-controlled temperatur­e sensors and cameras, it said.

In the worst case, control systems that drive “critical services to society“such as water, power and automated building management could be crippled, said Awais Rashid, a computer scientist at Bristol University in Britain who reviewed the Forescout findings.

In its advisory, CISA recommende­d defensive measures to minimize the risk of hacking. In particular, it said industrial control systems should not be

accessible from the internet and should be isolated from corporate networks.

The discovery highlights the dangers that cybersecur­ity experts often find in internetli­nked appliances designed without much attention to security. Sloppy programmin­g by developers is the main issue in this case, Rashid said.

Addressing the problems, estimated to afflict millions of devices, is particular­ly complicate­d because they reside in so-called open-source software, code freely distribute­d for use and further modificati­on. In this case, the issue involves fundamenta­l internet software that manages communicat­ions via a technology called TCP/IP.

Fixing the vulnerabil­ities in impacted devices is particular­ly complicate­d because opensource software isn’t owned by anyone, said Elisa Costante, Forescout’s vice president of research. Such code is often maintained by volunteers. Some of the vulnerable TCP/IP code is two decades old; some of it is no longer supported, Costante added.

It is up to the device manufactur­ers themselves to patch the flaws and some may not bother given the time and expense required, she said. Some

of the compromise­d code is embedded in a component from a supplier — and if no one documented that, no one may even know it’s there.

“The biggest challenge comes in finding out what you’ve got,” Rashid said.

If unfixed, the vulnerabil­ities could leave corporate networks open to crippling denial-ofservice attacks, ransomware delivery or malware that hijacks devices and enlists them in zombie botnets, the researcher­s said. With so many people working from home during the pandemic, home networks could be compromise­d and used as channels into corporate networks through remote-access connection­s.

Forescout notified as many vendors as it could about the vulnerabil­ities, which it dubbed AMNESIA:33. But it was impossible to identify all affected devices, Costante said. The company also alerted U.S., German and Japanese computer security authoritie­s, she said.

The company discovered the vulnerabil­ities in what it called the largest study ever on the security of TCP/IP software, a yearlong effort it called Project Memoria.

 ?? Matt Rourke / Associated Press ?? Software used by millions for business and home computers show vulnerabil­ities that can be exploited by hackers to penetrate networks.
Matt Rourke / Associated Press Software used by millions for business and home computers show vulnerabil­ities that can be exploited by hackers to penetrate networks.

Newspapers in English

Newspapers from United States