Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

Unprotected Database Exposes Details of Honda’s Internal Network

An unprotected, internet accessible ElasticSearch database exposed 134 million rows of sensitive data from Honda Motor Company, containing technical details on employee computers, including its CEO, Cloudflare security researcher Justin Paine reveals. 

An unprotected, internet accessible ElasticSearch database exposed 134 million rows of sensitive data from Honda Motor Company, containing technical details on employee computers, including its CEO, Cloudflare security researcher Justin Paine reveals. 

One of the largest automobile manufacturers in the world, Honda has offices around the globe, including Japan, United States, the U.K., Mexico, and elsewhere.

The insecure database was apparently made publicly accessible on July 1 and the security researcher discovered it on July 4 via Shodan. The database was promptly secured by Honda after being alerted by the researcher.

According to Paine, the information within the exposed database included data related to the internal network and computers of Honda. Specifically, the database appeared to be an inventory of all Honda internal computers. 

The exposed data involved machine hostname, MAC address, internal IP, operating system version, installed patches, and the status of Honda’s endpoint security software, Paine reveals. 

Within the database, the security researcher found around 134 million documents, amounting to around 40GB of around 3.5 months-worth of data (the information went as far back as March 13, 2019). According to the researcher, roughly 40,000 data points were being added to the database every day.

Due to its nature, the exposed information could allow an attacker to discover weaknesses within Honda’s internal network, given that it included specific details the security vendor used and the patch level on each system. Even machines without endpoint security software installed were listed there, Paine reveals. 

In addition to machine-related information, the database also included employee data in one of its tables. Specifically, the researcher found there information such as employee email address, employee name, department, last login, employee number, account name, and a mobile field that was empty. 

Advertisement. Scroll to continue reading.

The database even included information related to the CEO’s laptop, including CEO’s full name, full email, email nickname, employee ID, account name, last login date, department, MAC address, installed patches, OS, OS version, endpoint security status, IP, and device type.

“Thank you very much for pointing out the vulnerability. The security issue you identified could have potentially allowed outside parties to access some of Honda’s cloud-based data that consisted of information related to our employees and their computers,” Honda told the researcher in an email. 

The automaker also said that an investigation of the system’s access logs has revealed no signs of data being downloaded by any third parties. 

“At this moment, there is no evidence that data was leaked, excluding the screenshots taken by you. We will take appropriate actions in accordance with relevant laws and regulations, and will continue to work on proactive security measures to prevent similar incidents in the future,” the company said. 

Related: Provider of Data Services for Fortune 100 Firms Exposed Sensitive Files

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Data Protection

While quantum-based attacks are still in the future, organizations must think about how to defend data in transit when encryption no longer works.

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...