Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Canada Security IT

Backdoor In RuggedOS Systems: Infrastructure, Military Systems Vulnerable 154

FhnuZoag writes "A backdoor has been found in Canadian based RuggedCom's 'Rugged Operating System', providing easy access to anyone with the devices's MAC address — something often publically displayed. Rugged OS is being used in a wide range of applications, including traffic control, power generation, and even U.S. Navy bases. The backdoor was first found over a year ago, and RuggedCom have so far refused to patch out the exploit." The exploit is trivial: each device has a permanent "factory" user, and an automatically generated password derived from the MAC.
This discussion has been archived. No new comments can be posted.

Backdoor In RuggedOS Systems: Infrastructure, Military Systems Vulnerable

Comments Filter:
  • PCI-DSS and others (Score:5, Interesting)

    by Alioth ( 221270 ) <no@spam> on Wednesday April 25, 2012 @11:58AM (#39795785) Journal

    Using this device would mean you would fail PCI-DSS and probably a few other widely used standards (ISO-27001 for example). One of the first requirements in these standards is that default vendor passwords be changed. You can't change it or even disable it.

  • by h4rr4r ( 612664 ) on Wednesday April 25, 2012 @12:02PM (#39795837)

    From what I have seen, the PCI audit company would pass you anyway or the company would find another that would pass them. This is the main problem with PCI. As the entity that is being certified pays for the service they choose an auditor that will pass them. The correct way to do it would be if the industry paid for this service.

Neutrinos have bad breadth.

Working...