Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
Security Communications

The Dismal State of SATCOM Security 54

Posted by timothy
from the my-sputnik-or-yours dept.
An anonymous reader writes "Satellite Communications (SATCOM) play a vital role in the global telecommunications system, but the security of the devices used leaves much to be desired. The list of security weaknesses IOActive found while analyzing and reverse-engineering firmware used on the most widely deployed Inmarsat and Iridium SATCOM terminals does not include only design flaws but also features in the devices themselves that could be of use to attackers. The uncovered vulnerabilities include multiple backdoors, hardcoded credentials, undocumented and/or insecure protocols, and weak encryption algorithms. These vulnerabilities allow remote, unauthenticated attackers to compromise the affected products. In certain cases no user interaction is required to exploit the vulnerability; just sending a simple SMS or specially crafted message from one ship to another ship would be successful for some of the SATCOM systems."
This discussion has been archived. No new comments can be posted.

The Dismal State of SATCOM Security

Comments Filter:
  • OSS security debate (Score:4, Interesting)

    by janoc (699997) on Thursday April 17, 2014 @11:27AM (#46780107)

    Wasn't it just yesterday that someone has posted a flamebait summary [slashdot.org] about the Heartbleed bug changing the "Open source is safer" discussion?

    This is a great evidence of what happens when you rely on security by obscurity in proprietary software. Nobody is forced to fix things, sloppy coding is the norm and there are backdoors galore ...

    Unfortunately, the bad guys laugh, the vendors play ostrich with the heads in sand and everyone else is suffering the consequences ...

If you're not careful, you're going to catch something.

Working...