Skip to main content

Major security vulnerability could leave critical infrastructure defenseless

Update:

Recommended Videos

As of July 9, an Israeli company has announced that they had found a way to successfully block hackers from exploiting “multiple critical Ripple20 vulnerabilities,” they said in a statement. The Israeli company Sternum, which works on security for IoT devices, said they used a proprietary embedded integrity verification system (EIV) on the devices in question. EIV is a method of verifying that a file has not been corrupted, and that the file is what it says it is. The new method effectively corrected the vulnerabilities, and is also device agnostic, so would work across machines industries, they said. Sternum also said they are working with “industry leaders” to implement the changes and are expecting more outreach.

Original Article:

Think 2020 is bad? It could get a lot worse: An Israeli firm says a massive software vulnerability could mess with our critical infrastructure.

In this case, this is a vulnerability involving a software company called Treck, Inc.. The Cincinnati-based firm provides software for a range of companies to allow their devices to talk to the internet, powering everything from transportation to medical devices, home security cameras, power grids, aviation, and more. According to Jerusalem-based security research firm JSOF, a range of bugs in Treck’s code would allow a remote hacker to easily gain access to any device using Treck’s software and control it.

“These vulnerabilities are so low level that you can penetrate network security, and firewalls, and take over the device,” said Natali Tshuva, founder and CEO of the Internet of Things security company Sternum. “From that moment, the hacker has remote control and can do anything they want.”

These bugs, which JSOF have named Ripple20, occur when layers and layers of code get wrapped into each other for complex devices. It’s like taking someone else’s Lego tower and using it as the basis to build your own. There might be bad bricks in that person’s Lego, but if it’s a complicated structure, it will be hard to see that.

Power Lines
George Rose / Getty Images

“When you manufacture an IoT device, or a medical device for example, you don’t write the whole code yourself,” Tshuva said. “You take some third-party code for certain things, like communications. A lot of manufacturers, they can’t really assess the quality of the third-party code in their devices, and they have no security solutions to protect against third-party vulnerabilities,”

Most major parties insist that all the Ripple20 holes have already been patch. Treck told Digital Trends in a statement that it was “recently made aware” of JSOF’s research, which Treck “acted upon immediately.”

“Treck has fixed all issues that were reported and made them available to our customers either through our newest code release, or patches,” the spokesperson wrote.

In its rundown, JSOF included the names of more than 70 companies that were either possibly or definitely affected by these software holes. Texas Instruments, which was listed as possibly being affected, told Digital Trends that their products had not been impacted.

Two of the biggest names, Intel and Caterpillar, told Digital Trends that they were aware of the problem and either were in the process of fixing it or had already fixed it. Caterpillar said it had been alerted by the Department of Homeland Security and were working to identify the potential impacts. Intel recommended that everyone keep their systems updated as a good countermeasure.

Treck’s Ripple20 patching problem

Keeping systems updated, especially if most of the devices affected were large industrial or health care-related machines, isn’t as simple as downloading an app and installing an update, said Axel Wirth, chief security office at MedCrypt, which works on cybersecurity for healthcare providers.

In order to update a system, Wirth said, you need first need an approved version of the software from the vendor, and then you need the time to install it, and then get the relevant machines up and running again. For manufacturing or healthcare operations, which often operate 24/7, finding that time is incredibly difficult. Another problem, especially in health care, he said, is that while a software vendor may know who an initial customer is, sometimes that equipment is sold onward.

“After 10 or 20 years, it’s not uncommon when a hospital upgrades that it will sell its old devices to secondary markets,” Wirth said. “At that point, you lost track of where your device is.” That device is likely to be left un-updated, and therefore still vulnerable.

At the end of the day, said Chris Kennedy, chief information and security officer of cybersecurity firm AttackIQ, these kinds of vulnerabilities are never going to leave us. “The focus on the vulnerability is the wrong thing,” Kennedy told Digital Trends. “These systems are complex and poor in quality, and it’s that way so we can keep costs low. Sure you can increase the quality and make things better, but would you pay $200 for an app on your phone?”

Kennedy compared a system vulnerability to a robber breaking into a house. Having a lock on the door is a good deterrent, but after the robber has broken the lock, what else is there? Do you have an alarm system? Is there also a lock and an alarm system on the safe? Are there cameras in the house? Too often, Kennedy said, companies stop their security at the cyber equivalent of putting a wall around the house and then do nothing else.

“Stop trying to build the wall higher, and make sure the front door is locked, and make sure other layers of security are in place when the robber gets in the front door,” Kennedy told Digital Trends.

Maya Shwayder
I'm a multimedia journalist currently based in New England. I previously worked for DW News/Deutsche Welle as an anchor and…
NASA astronauts keep quiet about medical issue returning from ISS
NASA’s SpaceX Crew-8 at the agency’s Kennedy Space Center in Florida. Pictured left to right, Roscosmos cosmonaut Alexander Grebenkin, NASA astronauts Michael Barratt, Matthew Dominick, and Jeanette Epps.

Three NASA astronauts who recently returned from the International Space Station (ISS) have said that they are in good health but have declined to discuss the medical issue that required them to be diverted to a hospital following their return to Earth. The astronauts, who were part of the Crew-8 mission, landed on October 25 and were taken for routine medical checkups, after which the crew was taken to the Ascension Sacred Heart Pensacola hospital for further evaluations, and one member was hospitalized.

NASA has not shared which of the crew, which included Roscosmos cosmonaut Alexander Grebenkin as well as NASA astronauts Michael Barratt, Matthew Dominick, and Jeanette Epps, was hospitalized or why. However, the agency did state that the reentry and splashdown process of their spacecraft was normal and that the affected crew member was released from the hospital the next day in good health.

Read more
Planetary defense mission Hera blasts off toward Mars
Hera will perform a swingby of Mars in March 2025 as a way of gathering extra momentum on its way to the Didymos binary asteroid system. The spacecraft will fly within the orbits of both Martian moons Deimos and Phobos, and perform science observations of the former body and the planet's surface, in synergy with the UAE's Hope orbiter and gathering preparatory data for JAXA-DLR's MMX Martian Moons eXploration mission due to be launched in 2026.

The European Space Agency (ESA)'s planetary defense mission, Hera, has completed the first major maneuver of its journey following its launch in October. The spacecraft has burned its thrusters to put it on a course toward Mars, which it should reach to perform a gravity assist flyby in 2025.

The mission is a follow-up to NASA's DART mission, which deliberately crashed into an asteroid in 2022. DART was testing to see whether impacting a spacecraft into an asteroid could alter its trajectory, which it succeeded in doing. The idea is that if an asteroid should ever threaten Earth, space agencies could send a spacecraft to crash into it and knock it off course.

Read more
Andor season 2 is coming sooner than a lot of Star Wars fans thought
Cassian stands by a hillside in Andor season 1.

It looks like Lucasfilm may have accidentally revealed the long-awaited premiere date for Andor season 2, and on the Disney+ mobile app, no less. Early Saturday morning, some eagle-eyed users noticed a new date attached to the bottom of the app's Andor streaming tile. The date in question promises that Andor season 2 is coming April 22, 2025.

It isn't just possible but likely that this Disney+ update was made earlier than Lucasfilm planned. Not only was it added to the streaming service's mobile app with no accompanying announcement or comment from Lucasfilm, but Disney is also in the midst of hosting its D23 Brazil convention this weekend. The event has already given fans their first look at Diego Luna's Cassian Andor in Andor season 2, and it's possible that the show's return date was being saved for D23 Brazil as well.

Read more