Story image

Switch vulnerabilities leave critical infrastructure networks wide open to attack

27 Feb 2017

The US Department of Homeland Security has issued an urgent warning about two widely used industrial switches, saying they have vulnerabilities so serious they have been rated as 10 - the highest score for severity under the CVSS system.

The switches are commonly deployed in critical infrastructure sectors that provide services for sectors such as chemical, energy, food and agriculture, health and water, including those in Australia and New Zealand. 

The two switches in question are the Red Lion Controls’ Sixnet SLX Managed Industrial Switches; and AutomationDirect’s STRIDE Managed Ethernet Switches.

“Successful exploitation of the hard-coded cryptographic key vulnerabilities could result in loss of data confidentiality, integrity, and availability,” the Department of Homeland Security states on its website.

The switches use hardcoded SSH and SSL cryptographic keys and incorrect permissions assignment for a critical resource. 

There is no way to randomise or regenerate keys, identical keys are used in all products prior to the 5.3.174 release, allowing attackers to compromise every switch, intercepting and decrypting secure communications. 

The switches also use weak file permissions applied to the passed file. This file stores usernames and hashed passwords, but has incorrect and world-readable permissions assigned. 

Attackers can access the switches or firmware to gain credentials and conduct brute force attacks against password hashes. The switches don’t use password shadowing, which means insecure methods are being used for storing password hashes. 

The vulnerabilities were discovered by Brisbane-based security consultant for RIoT Solutions, Mark Cross.

Seagate: Data trends, opportunities, and challenges at the edge
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.
How blockchain could help stop video piracy in its tracks
An Australian video tech firm has successfully tested a blockchain trial that could end up being a welcome relief for video creators and the fight against video piracy.
IBM X-Force Red & Qualys introduce automated patching
IBM X-Force Red and Qualys are declaring a war on unpatched systems, and they believe automation is the answer.
Micro Focus acquires Interset to improve predictive analytics
Interset utilises user and entity behavioural analytics (UEBA) and machine learning to give security professionals what they need to execute threat detection analysis.
Raising the stakes: McAfee’s predictions for cybersecurity
Security teams and solutions will have to contend with synergistic threats, increasingly backed by artificial intelligence to avoid detection.
Exclusive: Ping Identity on security risk mitigation
“Effective security controls are measured and defined by the direct mitigation of inherent and residual risk.”
CylancePROTECT now available on AWS Marketplace
Customers now have access to CylancePROTECT for AI-driven protection across all Windows, Mac, and Linux (including Amazon Linux) instances.