Critical flaw lets attackers control hospital, military buildings' systems
Posted on 07 February 2013.
A critical zero-day remote-access vulnerability in an industrial control system that is widely used in hospitals, military installations, manufacturing plants and other critical locations has been discovered and demonstrated by noted researchers Billy Rios and Terry McCorkle at the latest Kaspersky Security Analyst Summit, Wired reported.

The vulnerability affects the Tridium Niagara AX Framework, and lets remote attackers access the system's configuration file that contains login credentials for operator work stations, through which the attackers can gain complete control of electricity and HVAC systems, elevators, surveillance cameras, electronic door locks and more.

In order to get root access to the system, the researchers have concatenated two distinct bugs, and then used a specially crafted backdoor module to be able to "stay" in it.

The attack can't work on systems that are not directly accessible from the Internet, but unfortunately many are. By using the Shodan search engine, the researchers discovered over 21,000 Tridium systems facing the Internet.

Tridium has been notified of the flaw and they are working on a fix that should be released by February 13.

"The vast majority of Niagara AX systems are behind firewalls and VPNs - as we recommend - but clearly, as Rios and McCorkle have shown, there are many systems potentially at risk," commented Tridium spokesman Mark Hamel.


Harnessing artificial intelligence to build an army of virtual analysts

PatternEx, a startup that gathered a team of AI researcher from MIT CSAIL as well as security and distributed systems experts, is poised to shake up things in the user and entity behavior analytics market.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.

Tue, Feb 9th