'Huge Flaw' Threatens US Emergency Alert System, DHS Researcher Warns (arstechnica.com) 26
An anonymous reader quotes a report from Ars Technica: The US Department of Homeland Security is warning of vulnerabilities in the nation's emergency broadcast network that makes it possible for hackers to issue bogus warnings over radio and TV stations. "We recently became aware of certain vulnerabilities in EAS encoder/decoder devices that, if not updated to the most recent software versions, could allow an actor to issue EAS alerts over the host infrastructure (TV, radio, cable network)," the DHS's Federal Emergency Management Agency (FEMA) warned. "This exploit was successfully demonstrated by Ken Pyle, a security researcher at CYBIR.com, and may be presented as a proof of concept at the upcoming DEFCON 2022 conference in Las Vegas, August 11-14."
Pyle told reporters at CNN and Bleeping Computer that the vulnerabilities reside in the Monroe Electronics R189 One-Net DASDEC EAS, an emergency alert system encoder and decoder. TV and radio stations use the equipment to transmit emergency alerts. The researcher told Bleeping Computer that "multiple vulnerabilities and issues (confirmed by other researchers) haven't been patched for several years and snowballed into a huge flaw."
"When asked what can be done after successful exploitation, Pyle said: 'I can easily obtain access to the credentials, certs, devices, exploit the web server, send fake alerts via crafts message, have them valid / pre-empting signals at will. I can also lock legitimate users out when I do, neutralizing or disabling a response,'" Bleeping Computer added.
Pyle told reporters at CNN and Bleeping Computer that the vulnerabilities reside in the Monroe Electronics R189 One-Net DASDEC EAS, an emergency alert system encoder and decoder. TV and radio stations use the equipment to transmit emergency alerts. The researcher told Bleeping Computer that "multiple vulnerabilities and issues (confirmed by other researchers) haven't been patched for several years and snowballed into a huge flaw."
"When asked what can be done after successful exploitation, Pyle said: 'I can easily obtain access to the credentials, certs, devices, exploit the web server, send fake alerts via crafts message, have them valid / pre-empting signals at will. I can also lock legitimate users out when I do, neutralizing or disabling a response,'" Bleeping Computer added.
The flaw is having a DHS at all. (Score:1, Flamebait)
Re: (Score:2)
After the Hawaiian Missile Crisis [gq.com] I'm not sure I disagree. But then again, the Emergency Broadcast System has proven useful over the years for weather threats and the like.
Re:The flaw is having a DHS at all. (Score:5, Interesting)
Re: (Score:2, Informative)
I managed some EBS systems way back when for a non-public group (long story, can't talk about) and it ended up not being all that important because nobody was using it, but I had a big eye opening experience from it. I got the same vibe from you. When they went EAS and especially when Cheney's cronies took over running everything, you might have just nuked the whole pr
Re:The flaw is having [national security] at all. (Score:1)
Well, better than an AC brain fart as FP, but not that much better. How about if you [Revek] bookmark the FP and establish your Subject, then explain what you mean, especially if you want to use loaded and relatively meaningless words in your comment. By waiting for the reply I think you lost your focus, so yes, I am suggesting that you should have replied to your own FP. (Best we can do with the Slashdot tool as it exists now?)
Also nice if you link it back to the story as summarized on Slashdot. I know it
Re: (Score:1)
You suggested I didn't read the post and articles. I already had prior to the slashdot post. In fact I had sent the article to the guy currently responsible for the EAS systems I installed. He already knew and they had updated them some time ago.
My follow up was my own personal experience with the DHS bu
Re: (Score:2)
This isn't the company that manufactured the units fault.
Eh? Of course it's their fault. They delivered defective code with a security vulnerability.
The Update is a repair/mitigation for defective code, But It is still a device manufacturer's fault there was a defect in the code they originally shipped with.
In addition... All too often manufacturers' communication efforts to make sure all units in customers hands containing code with a known defect are clearly Identified and Documented when each u
Re: (Score:2)
The rudeness of the discussion has basically driven me out of it, but I think your comment is confusing moral fault with legal liability.
The dominant principle of software development these days is "Whatever happens to you because of my bad software, my legal liability is limited, preferably to 'none'." Almost surely not a simple shrinkwrap contract in this case, but I'm sure they applied the same principles to the maximum degree possible when they were preparing the contract. I think most of the discredit
Re: (Score:2)
Re: (Score:2)
Oh, so it's RUDE you want. You missed your chance to apologize. Not wasting my time reading farther.
Insofar as I can remember your identity, I'll ignore you. Thank you for reciprocating. Or for dropping dead. No difference that I can detect.
Why would I (or anyone else) care?
Re: (Score:2)
Re: (Score:2)
So if I don't update a server for nine years and it gets taken over that its the fault of the manufacturer?
Actually, yes. Ultimately it doesn't matter whether it's day 1 or day 3285 - Purchase is a forever transaction based on their representation that the product does X at the time of sale - the defect is in a product shipped by the manufacturer,
and you could prove that. Software code does not undergo wear-and-tear, so short of a defect in ROM storage: you can assure the code loaded on the unit is
Re: (Score:2)
NAK
Re: (Score:2)
Re: (Score:1)
The DNC can fuck up anything.
Re: (Score:2)
Sorry? Do you have an actual point?
Or are you REALLY stupid enough to try and blame the fuckups of NOW on a TWO DECADE OLD inception?
Re: (Score:2)
https://www.youtube.com/watch?... [youtube.com]
No flaws when you're drinkin' claws (Score:4, Funny)
'Huge Flaw' Threatens US Emergency Alert System
That sounds serious.
radio and TV stations
Oh, had me worried there for a minute. I thought hackers could make emergency alerts pop up somewhere I might actually see them, like on my phone.
Re: No flaws when you're drinkin' claws (Score:2)
Better fix it before the next insurrection (Score:1)
Just trying to imagine the chaos that would have ensued if the Jan 6th insurrectionists had the ability to lock out the officials and broadcast their own nation-wide emergency instructions and it seems scarier than a nuke.
Re: (Score:2)
Just remember:
''You Can’t Be Pro-Insurrection And Pro-American,' Says President Of Nation Founded By An Insurrection'
https://babylonbee.com/news/yo... [babylonbee.com]
Re: (Score:2)
Bring Back Civil Defence (Score:2)