Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Security

Thousands of SCADA, ICS Devices Exposed Through Serial Ports 66

Trailrunner7 writes "Serial port servers are admittedly old school technology that you might think had been phased out as new IT, SCADA and industrial control system equipment has been phased in. Metasploit creator HD Moore cautions you to think again. Moore recently revealed that through his Critical IO project research, he discovered 114,000 such devices connected to the Internet, many with little in the way of authentication standing between an attacker and a piece of critical infrastructure or a connection onto a corporate network. More than 95,000 of those devices were exposed over mobile connections such as 3G or GPRS. 'The thing that opened my eyes was looking into common configurations; even if it required authentication to manage the device itself, it often didn't require any authentication to talk to the serial port which is part of the device,' Moore told Threatpost. 'At the end of the day, it became a backdoor to huge separate systems that shouldn't be online anyway. Even though these devices do support authentication at various levels, most of the time it wasn't configured for the serial port.'"
This discussion has been archived. No new comments can be posted.

Thousands of SCADA, ICS Devices Exposed Through Serial Ports

Comments Filter:
  • by Anonymous Coward

    News Flash: If you have physical access to hardware, you can hack it!

    *yawn*

    • There is hardware called "Remote Access Servers" that allow you to forward serial connections over a network connection via SSH or whatever.
      • Re: (Score:3, Funny)

        Try to convince an old plant manager he needs vpn. Try to explain to him what one is.
        • Re:How is this news? (Score:5, Informative)

          by dreamchaser ( 49529 ) on Wednesday April 24, 2013 @07:03PM (#43541885) Homepage Journal

          Try to convince an old plant manager he needs vpn. Try to explain to him what one is.

          It isn't as hard as you might think. "Do you lock the door to your house? A VPN is like that for your data."

          It isn't a great analogy but trust me, it works. I've used it quite a few times.

          • I like to use the following comparison: A VPN is like pulling a real cable between two machines that are separated over a large (or even short) distance.
          • I've been doing things this way for 20 years and there has been no problems. I know what I am doing. Stop wasting my time kid.
            </old manager simulation>

            • I've been doing things this way for 20 years and there has been no problems. I know what I am doing. Stop wasting my time kid.
              </old manager simulation>

              That almost never happens, partially because I'm not a kid (late 40's) and partially because their employer is paying gobs of money for my time as a security engineer/consultant.

        • Define "old" ... (Score:5, Insightful)

          by perpenso ( 1613749 ) on Wednesday April 24, 2013 @07:18PM (#43541981)

          Try to convince an old plant manager he needs vpn. Try to explain to him what one is.

          Define "old". Some 50 year olds were playing with TRS-80, Commodore PET and Apple II computers when they were kids in high school. I think we are at, or soon will be, past the point where "old" equates to unfamiliarity with digital technology.

          • Perhaps not with "old," but "MBA" still will We'll call 50/50 odds on an exception applying to MBAs in IT/IS from major universities, though the community colleges teach that stuff better at the associates level.
            • Perhaps not with "old," but "MBA" still will We'll call 50/50 odds on an exception applying to MBAs in IT/IS from major universities, though the community colleges teach that stuff better at the associates level.

              That doesn't seem to work either. 8 years ago 1/3 of the class in my MBA program were coming from engineering backgrounds. Those that did not seemed to have no problem dealing with technology. 100% used a VPN regularly to access campus resources when off campus.

              I get your sentiment, I used to share it. One of the things that made business school so much fun was to learn how wrong I was and laugh at myself. Seriously, an MBA program is nothing like you think it is. The execs you see on the nightly news ar

          • Re: (Score:2, Insightful)

            by Anonymous Coward

            Some day you'll be at the point where you don't equate 50 with "old."

            • Some day you'll be at the point where you don't equate 50 with "old."

              I don't now, but when I was learning to program on my Apple II I did. ;-)

    • by dogsbreath ( 730413 ) on Wednesday April 24, 2013 @07:28PM (#43542055)

      er. . . Typically these are tied to dial up modems or to IP port servers. They are used to access systems when the secure front door is unavailable due to Internet outages, firewall problems or the access gateway being unavailable.

      You would not think anyone would be so dumb to set these up but sone may be legacy, or put in place by a local hero sysadmin.

      It may even be, get this, a contractually required remote support access point. Many vendors have a very limited concept of what is required to prevent unauthorized access. One vendor sales guy told me that it was secure because no one would know about the dial up number and they had no reported break ins at other installations.

      Sigh.

      Of course there are ways of providing secure alternative access paths but there are a lot of folk who are under the impression that obscurity is sufficient.

      Another issue besides the lack of authentication is the lack of logging and activity reporting. One outfit I did some work for spent a dinghy full of large bills on an IPS for the network side but would not pay for caller ID on their dial-up access point. Against their financial responsibility policy to pay for frivilous monthly charges.

      • by skids ( 119237 )

        You would not think anyone would be so dumb to set these up but some may be legacy, or put in place by a local hero sysadmin.

        A lot of these are spare aux or console ports on Cisco routers. The actual syntax used to set one up is a bit contorted, so it's possible for someone inexperienced who is following crib notes to think they are just enabling access to the serial port from the router commandline when in fact they are also enabling an alternate telnet/ssh port.

        Also a few of the newer platforms coming out from Cisco include the ability to run a linux server on the second core ("embedded service module") and the default configu

      • and with caller id being regullarly spoofed, they were correct. I get calls supposedly coming from the State Senate Building, the God Damn White House, Washington Monument and other locations so caller ID has become damn near useless unless you know the phone number they're calling from. For a company with dial in accounts, Caller ID is damn near useless because it's simply more data to either look at or to keep.

  • Dupe (Score:4, Informative)

    by hackshack ( 218460 ) on Wednesday April 24, 2013 @06:12PM (#43541577)

    Jan 10: Thousands of SCADA Devices Discovered on the Open Internet [slashdot.org]

    Best part is, it's the same submitter. And y'all wonder why /. is dying.

    • Re:Dupe (Score:5, Informative)

      by Anonymous Coward on Wednesday April 24, 2013 @07:37PM (#43542119)

      Not a dupe. The SCADA segment bit is overlap, but the access method is different. This issue applies to more than SCADA, some thousands of unsecured serial port proxies were actually modern Linux and FreeBSD serial consoles, conveniently preauthenticated as root.

  • At the end of the day, it became a backdoor to huge separate systems that shouldn't be online anyway.

    Well, duh. There's about a million tons worth of devices that shouldn't be on the internet, but they are. Rather than bemoan something we've known since the internet was first turned into a public network... why not ask ourselves some more probing questions, like why they're on the internet?

    I'll give you a hint: Because auto-configuration (DHCP!) and gateways that allow anything hitting them from the inside to freely traverse are the norm. And it's easier to fix a single gateway than a hundred devices.

  • by mpoulton ( 689851 ) on Wednesday April 24, 2013 @06:28PM (#43541655)
    Back in the olden days, equipment like this had serial port configuration interfaces which were intended for use by nearby administrators, via terminals and small local networks with no connectivity beyond the local facility. If longer distance administration was required, it was over dedicated copper loops. The internet was simply not used for these kinds of systems, and the idea that those devices would ever end up on a globally-accessible network with millions of untrusted devices was incomprehensible. As technology developed and the internet took over as the primary means of long-distance networked communication, these legacy devices were incorporated into a network environment that their engineers had never even considered. It's just not what they were made for. The devices are not to blame. Engineers and administrators who put them on public networks certainly are.
    • by AK Marc ( 707885 )
      That's the issue when people use security by obscurity. The obscurity was the difficulty in networking the serial port. Anything made in the past 20 years should have had an Ethernet port and real security. Yes, even this SCADA stuff.
      • by perpenso ( 1613749 ) on Wednesday April 24, 2013 @07:40PM (#43542149)

        That's the issue when people use security by obscurity. The obscurity was the difficulty in networking the serial port. Anything made in the past 20 years should have had an Ethernet port and real security. Yes, even this SCADA stuff.

        Its more security through physical access, not so much obscurity. The original intent was probably to give a tech in the room, or a user in a nearby room, access. Also its the ease of turning a serial port into a remote connection that is at the heart of the problem.

        YMMV but such stuff I worked on in the 90s had multilevel (user, tech, admin, ...) passwords, even on serial port access. Ethernet or serial port, it makes no difference when the site does not change the passwords from their factory settings.

        • A remote access may also mean more than just being able to talk to it from your desk. The machine being talked to may not even be in the building where you work, it may not even be in a building, it could be a hundred miles away on the side of a rural country road, or a tiny substation. You're not going to get an ethernet connection to it, but serial port is doable (though a bit expensive). Some places use a 3G data connection (sim card and all). Ultimately though the end port is very often a serial por

        • by AK Marc ( 707885 )
          It was *never* deployed that way. Every single serial port was networked. Run back to a server of some kind. I've never seen a SCADA network that didn't have a central console with miles of copper networking every port. The SCADA console was usually not networked, but was more likely as time went on that it was networked. Then you ended up with serial aggregators being networked, and the SCADA console being networked, and no more direct connection between the master and controlled devices.

          Usually, the
      • Not necessarily. That ethernet port has no security by default either. All it's going to be on a 20 year old machine is a bare telnet port to the command line, and that's likely what you have on more modern devices too. So identical security issues from a telnet into a server to serial port as opposed to direct telnet into the device (and yes, many serial port interfaces can be configured with passwords and time outs).

        • by AK Marc ( 707885 )
          I never said that Ethernet requires security, but rather than assuming secure access by plugging an unsecured serial port into an unknown device. When you toss something onto Ethernet, you are more likely to correctly assume insecurity.
      • All security is security through obscurity. What do you think a password is? What do you think a key (digital or physical) is? Obscure patterns that other parties aren't likely to know.

        Please don't repeat sayings you've heard until you actually understand them.

        • by AK Marc ( 707885 )
          security through obscurity is having a known flaw (And a password isn't a flaw) and the principle security is hiding that flaw. Open access to a serial port "secured" only because the IP isn't known is security through obscurity.
      • This is nothing. The fact that all kinds of fun gizmos now have cellular modems makes just about anything you try to do for security futile.

        • by AK Marc ( 707885 )
          Most of those are SIM-based. If you remove the SIM, then there's no issue. Others will let you turn the radio off in hardware. I work for a mobile carrier that will let you whitelist a single IP to talk to that cellular modem (usually your GRE/VPN head-end). That, and the radio is mostly useless unless you do something like pay for a plan.
    • by Darinbob ( 1142669 ) on Wednesday April 24, 2013 @07:39PM (#43542131)

      Don't treat these all as legacy devices either. Brand new devices manufactured today still have serial ports. They're often on protocols other than a simple command line, and an RS232 or RS485 connection are robust and versatile.

      The alternative to a serial port with command line? Ethernet with command line, which is every bit as insecure. All the article really points out is that sometimes people forget about security, since there is nothing inherently insecure about a serial port. I just read this as people being surprised that technology from the past is still in use; next up complaints about how we still use archaic concepts like the wheel, inclined plane, and lever.

      Ie, get a secure connection to the terminal server, then normal serial port to the actual device. No one is going to be snooping on the serial line itself any more than they'd be snooping on the ethernet cable. The insecure part is the internet.

      • by fluffy99 ( 870997 ) on Wednesday April 24, 2013 @09:59PM (#43542885)

        In the systems I've seen, they are using stuff like MoxaPorts for serial to ethernet. It's done as either serial to serial tunneling over ethernet, or one side is a computer with the lantronix serial redirector client installed. The devices require a password to configure, but typically access to the serial port is simply telneting to port 10001 and there is zero security unless the serial port on the device has access controls. Engineers like the simplicity of setting it up and usually don't consider that everyone else on the network can too.

        • Those things are usually installed by engineers with very little knowledge/concern about security. In my field there's an urge for bluetooth connectivity for the industrial equipments, with all the security nightmares bluetooth poses on accessing a device. Wi-fi could be used with a much better security model, but it's considered too complicated...

      • The alternative to a serial port with command line? Ethernet with command line, which is every bit as insecure.

        Not quite true. The article itself is concerned with the fact that serial ports offer little to no authentication on their lines. At least Ethernet there is often a token login/password to get in. Standard practice in the industry for years was to assume that a device connected via Ethernet will not be in the same room, whereas RS232 will be a user with a laptop standing next to the SCADA system and thus is already "authorised".

        I don't think I've seen a single SCADA system ask for a login over a serial port

        • All the power utility systems I've seen all have a password, though I haven't seen all that many. Though maybe they all have the default password, which I think is just as likely with things like cisco routers from what I've seen.

        • by dkf ( 304284 )

          The article itself is concerned with the fact that serial ports offer little to no authentication on their lines.

          But is the serial line routed off site? If you have to have physical access to the immediate locale or go through a properly-secured terminal server, the fact that the serial line itself doesn't do a lot of auth doesn't really matter.

          The real problem comes when people connect these things to the internet (either directly or indirectly) without thinking about network security. (Security always makes things more difficult, but good security is that which makes things much more difficult for the unauthorized w

          • Unfortunately ALL SCADA systems I've used which require authentication had a default username and password set.

            Did I mention that SCADA vendors need introducing to a +3 Blessed Baseball Bat of Cluefulness?

            Not vendors. System integrators. Changing the password on these systems is often trivial, but then if someone forgets we can't find it in the manual under "Default password" now can we.

        • by Rich0 ( 548339 )

          I don't think I've seen a single SCADA system ask for a login over a serial port.

          I'm not sure you'd want it to either. If you're going to use a terminal server, then put security on the terminal server (use ssh/etc).

          The next thing people will be pointing out that most JTAG ports don't have any authentication either, and that it is possible to wire those up to a terminal server as well.

          The problem is with administrators who interface devices on a network without any authentication. My laser printer doesn't require authentication and that isn't a problem, but I'm not going to stick it o

  • by presidenteloco ( 659168 ) on Wednesday April 24, 2013 @06:58PM (#43541851)

    Infrastructure devices will have to be internetworked on a large scale.

    Just saying "air gap" it is I'm afraid a trite solution that will not meet the "smart grid" requirement to adjust energy flows dynamically based on a mixture of large-area and local algorithms.

    So, aside from "air gap", what do people propose for securing widely internetworked smart critical infrastucture?
    1. Use a second physically completely separate Internet for infrastructure only?
    2. Work harder on secure tunnelling technology, put it on the "real" Internet, and use security management best practices?
    3. What else?

    • I don't think you're understanding the issue at hand. This isn't just a case of connecting networked devices to the internet it's a whole level more boneheaded than that. The article is talking about putting interfaces designed purely for local physical access over the internet, interfaces often with no authentication which provide root access to the devices.

      Any such legacy interface does not have a place in our "smart grid". If companies want to implement smart grid or remote monitoring then they should d

    • >Just saying "air gap" it is I'm afraid a trite solution that will not meet the "smart grid" requirement to adjust energy flows
      > dynamically based on a mixture of large-area and local algorithms.

      Statements like that make me mad. When you turn on a 100 watt light bulb 100 watts of power are dynamically rerouted to your house and the extra power needed is automatically added to the generation schedules of multiple remote power plants using a mixture of large-area and local a

      • Well, working in a multi-disciplinary smart grid r&d team, I certainly have noticed a culture clash between the traditional power engineers and the software "charlatans".

        Your post does nothing to dispel that perception.

        One difference between the grid of today and the smart grid is the smart grid will need "distributed intelligence" at the edges, not just the center, of the grid.
        To accommodate a significantly larger component of distributed generation and storage, it will need attributes such as:
        - bi-dir

  • by ArcadeMan ( 2766669 ) on Wednesday April 24, 2013 @07:40PM (#43542155)

    Anyone else read the title as "Thousands of SCADA, Ice Cream Sandwich devices exposed through serial ports"?

  • News flash! if you open the SCADA boxes you have full access to it! That means over 200 Trillion SCADA systems are easily hacked! Al Kidea is just itching to blow up the world due to this huge security breach of using COMMON SCREWS to keep the enclosures closed.

  • by Anonymous Coward

    Having been an automation engineer since Allen-Bradley invented the PLC, I can tell you that the only wise assumption an integrator could (and still does) make is that all communications are insecure out of the box. Serial, TCP/IP, and the dozens of proprietary protocols all have strengths and weaknesses. The precautions to be applied are situational (risk, cost, flexibility, etc.).

    A lot of the bugs and vulnerabilities, that only in recent years have gotten much notice, have been around for since the beginn

  • Frequently I am called upon to work on a device remotely and the only way to access it without being constantly disconnected is through a service processor attached to a serial port or a serial port server. Proper troubleshooting involves being able to reboot a device without being disconnected, read the boot messages as they appear, and be able to access a maintenance or BIOS manager to fix it.

    The security is there, it has to be properly implemented with a policy to follow and back it up. All of these do

You are always doing something marginal when the boss drops by your desk.

Working...