The Dismal State of SATCOM Security 54
An anonymous reader writes "Satellite Communications (SATCOM) play a vital role in the global telecommunications system, but the security of the devices used leaves much to be desired. The list of security weaknesses IOActive found while analyzing and reverse-engineering firmware used on the most widely deployed Inmarsat and Iridium SATCOM terminals does not include only design flaws but also features in the devices themselves that could be of use to attackers. The uncovered vulnerabilities include multiple backdoors, hardcoded credentials, undocumented and/or insecure protocols, and weak encryption algorithms. These vulnerabilities allow remote, unauthenticated attackers to compromise the affected products. In certain cases no user interaction is required to exploit the vulnerability; just sending a simple SMS or specially crafted message from one ship to another ship would be successful for some of the SATCOM systems."
As a SATCOM professional... (Score:4, Informative)
Re:Encryption (Score:2, Informative)
That won't protect you from denial of service attacks.
And in quite a lot of the use cases, the reaction won't be "Bummer, can't get to slashdot" but will be:
- "Bummer, can't warn the train driver there are boulders on the rail"
- "Bummer, can't contact search and rescue and the ship is sinking"
- "Bummer, can't contact HQ and request Air support to help with these guys shooting rpgs on my convoy"
Note: Substitute "Bummer" with appropriate four letter word.
Also,
type 1 encryption devices won't be available to most users (certainly not to civilians outside the US).