Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

Over 100 Flaws Expose Buildings to Hacker Attacks

A researcher has discovered over 100 vulnerabilities in building management and access control systems from four major vendors. An attacker can exploit these flaws to gain full control of impacted products and manipulate the systems connected to them.

A researcher has discovered over 100 vulnerabilities in building management and access control systems from four major vendors. An attacker can exploit these flaws to gain full control of impacted products and manipulate the systems connected to them.

Roughly one year ago, Gjoko Krstic, a researcher at industrial cybersecurity firm Applied Risk, started analyzing building management (BMS), building automation (BAS) and access control products from Nortek, Prima Systems, Optergy, and Computrols. The products include Computrols CBAS-Web, Optergy Proton/Enterprise, Prima FlexAir, and two Nortek Linear eMerge products.

Building management system Krstic has identified a total of over 100 security holes in these systems to which nearly 50 CVE identifiers have been assigned; some of the issues are variations of the same flaw.

The vulnerabilities include default and hardcoded credentials, command injection, cross-site scripting (XSS), path traversal, unrestricted file upload, privilege escalation, authorization bypass, clear-text storage of passwords, cross-site request forgery (CSRF), arbitrary code execution, authentication bypass, information disclosure, open redirect, user enumeration, and backdoors.

The flaws, many of which have been classified as “critical,” can allow an unauthenticated attacker — either on their own or by being chained with other vulnerabilities — to take full control of the impacted systems.

Krstic summarized his findings last month at SecurityWeek’s ICS Cyber Security Conference in Singapore and Applied Risk has now published advisories for each of the impacted products. The company expects to release a full research paper, which includes technical details, in June.

Learn More About Building Cybersecurity at SecurityWeek’s 2019 ICS Cyber Security Conference

Krstic said during his presentation that the flaws could impact up to 10 million people and 30,000 doors at 200 facilities; the estimate is based on product documentation and online information.

He said an attacker can conduct a wide range of activities after hijacking the vulnerable systems, including trigger alarms, lock or unlock doors and gates, control elevator access, intercept video surveillance streams, manipulate HVAC systems and lights, disrupt operations, and steal personal information.

Advertisement. Scroll to continue reading.

A Shodan search revealed over 2,500 systems that are directly exposed to the internet, many made by Nortek. Krstic told SecurityWeek in an interview that the exposed buildings include a famous monument and a major financial organization, both in the United States.

All of the impacted vendors released patches for their products after being notified by Applied Risk, except for Nortek, which appears to have a poor process for reporting vulnerabilities. The company at one point told SecurityWeek that the issues identified by Applied Risk had already been patched, despite the company not receiving the actual details of the flaws — Applied Risk said it did not receive a response from Nortek after requesting a PGP key.

Related: Schneider Electric Patches 16 Flaws in Building Automation Software

Related: The Secret to Securing Smart Buildings

Related: Researchers Create PoC Malware for Hacking Smart Buildings

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

Shaun Khalfan has joined payments giant PayPal as SVP, CISO.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.

IoT Security

A vulnerability affecting Dahua cameras and video recorders can be exploited by threat actors to modify a device’s system time.