Billy Rios and Terry McCorkle, researchers for Cylance, an Irvine, California-based security firm, discovered that Google was using an outdated version of the Niagara framework building management system.
In a blog post, Rios and McCorkle explained that Cylance has an ongoing project to identify vulnerable Industrial Control System (ICS) deployments. Tridium’s Niagara Framework is one such system. The patch for the Tridium systems was released a year after Cylance disclosed it to the company, a process described by Rios at the time as frustrating, due to the vendor being so unresponsive.
The patch addressed directory traversal flaws, weak credential storage – including plaintext, and easily predictable session IDs. The issue is that while a patch is available, customers are not applying it – which is where Google comes in.
“It turns out, Google is using Tridium Niagara for various Building Management Systems (BMS) in their Google Wharf 7 building,” a Cylance blog post on the discovery explains. Wharf 7 is Google’s base of operations in Sydney, Australia.
“Armed with a few pieces of data, we utilized a custom exploit to extract the most sensitive file on a Tridium device, the config.bog file. The config.bog file contains the specific configurations for this particular device, but more importantly, it also contains the usernames and passwords for all the users on the device.”
Once accessed, the researchers had full control over the building’s security and HVAC controls. However, given the sensitive nature of the ICS deployment, they didn’t alter anything on the device. Instead, they reported their findings to Google via their Vulnerability Rewards Program (VRP).
“At the time of this blog post, this exact issue affects tens of thousands of devices on the Internet and thousands of different organizations,” the Cylance post concludes.
“If you have a corporate campus or a modern building of any sort… you’re likely running similar systems someplace on your network. We’ve already discovered over twenty five thousand of these systems facing the Internet… If Google can fall victim to an ICS attack, anyone can.”
More from Steve Ragan
- Anonymous Claims Attack on IP Surveillance Firm Brickcom, Leaks Customer Data
- Workers Don’t Trust Employers with Personal Data: Survey
- Root SSH Key Compromised in Emergency Alerting Systems
- Morningstar Data Breach Impacted 184,000 Clients
- Microsoft to Patch Seven Flaws in July’s Patch Tuesday
- OpenX Addresses New Security Flaws with Latest Update
- Ubisoft Breached: Users Urged to Change Passwords
- Anonymous Targets Anti-Anonymity B2B Firm Relead.com
Latest News
- Critical Vulnerability Impacts Over 120 Lexmark Printers
- BIND Updates Patch High-Severity, Remotely Exploitable DoS Flaws
- Industry Reactions to Hive Ransomware Takedown: Feedback Friday
- Microsoft Urges Customers to Patch Exchange Servers
- Iranian APT Leaks Data From Saudi Arabia Government Under New Persona
- US Reiterates $10 Million Reward Offer After Disruption of Hive Ransomware
- Cyberattacks Target Websites of German Airports, Admin
- US Infiltrates Big Ransomware Gang: ‘We Hacked the Hackers’
