|
|
|
![]() |
|
|||||||
|
||||||||
![]() |
| Thread Tools | Rate Thread | Display Modes |
|
#1
|
|||
|
|||
|
Today I was scanning our local network for *reasons* and I noticed that the cRIO had some open open ports. So then I decided to run a vulnerability scan with nessus and it turned out to have 2!!!! high priority security vulnerabilities. The first was a FTP vulnerability to allow for un-authorized read/write access to the cRIO and the second was a vxworks vulnerability allowing for remote reading and writing of any sector of data and also remote code execution. From this, as a proof of concept, I then used Metasploit which had a BUILT-IN exploit for rebooting a VXWorks machine by the IP address alone. Not sure what SHOULD be done about this issue, I just thought I would bring it to the public's attention that it exists.
![]() TL;DR version cRIO Vulnerabilities = Un-Authorized FTP + Remote Code Execution Tools = Metasploit + Nessus 5-Second Result = Reboot any robot without credentials |
|
#2
|
|||
|
|||
|
Re: cRio + Metasploit = :D
I'd like to point out a few quick things.
1) Both of these "exploits" are actually features. The FTP allows you to upload code. The remote reboot allows you to, well, remotely reboot. 2) Both of these require you to be part of the same network as the cRIO. In competition, the 6 robots are essentially on 6 separate networks. 3) Unless you hand out your wireless key, you are fine. |
|
#3
|
|||
|
|||
|
Re: cRio + Metasploit = :D
The FTP and Remote Reboot ARE both features, but what I found was exploits that allows you to remotely connect to the FTP and reboot WITHOUT having any kind of login credentials, granted the logins for all the robots are the same, so theres really no difference in the security, but it was just an interesting find.
|
|
#4
|
||||
|
||||
|
Re: cRio + Metasploit = :D
Where the Metasploit bit gets really interesting is the ability to reboot systems without authentication. With the amount of stuff that uses vx-works to run it is a little worrying what could possibly be done if someone hacked into a network.
A few wikipedia examples: Robots BMW iDrive 787 and 747-8 Planes WRT54G Router Apache Longbow Attack Helicopter Lots of spacecraft. Someone with the wrong motives could add something to get into a network (say of an Apache) and reboot it putting its operators or others in danger. |
|
#5
|
||||
|
||||
|
Re: cRio + Metasploit = :D
Have fun breaking WPA2 encryption in 3 days. (You can't.)
|
|
#6
|
||||
|
||||
|
Re: cRio + Metasploit = :D
You could, but first you have to prove P = NP.
|
|
#7
|
||||||
|
||||||
|
Re: cRio + Metasploit = :D
I think if someone was able to walk up to an Apache Helicopter and plug a network cable in, undetected, the Army has much bigger problems then a single Apache being rebooted in flight.
|
|
#8
|
|||||
|
|||||
|
Re: cRio + Metasploit = :D
Quote:
The Predator drone used an unencrypted communication protocol so ground troops could view the video on portable video receivers. They never counted on anyone else "flipping through the channels", and then googling how to fix a scrambled video feed. The lesson? NEVER rely on security through obscurity. |
|
#9
|
||||
|
||||
|
Re: cRio + Metasploit = :D
Quote:
|
|
#10
|
||||
|
||||
|
Re: cRio + Metasploit = :D
Quote:
If the insurgents are close enough to the apache, why aren't they dead? Anyways..... |
|
#11
|
||||
|
||||
|
Re: cRio + Metasploit = :D
Quote:
And I thought WPA could be broken rather quickly if you see the handshake between the client and the host. Or does that only apply to WPA(1) not WPA2? The Apache was just a random example, a disgruntled worker may be able to get into a cRio that would normally require authorization without it and cause a massive system to malfunction etc. With the number of things that run on it, anyone from a double agent to a disgruntled employee could cause issues. Last edited by Trent B : 28-08-2010 at 01:53. |
|
#12
|
|||||
|
|||||
|
Re: cRio + Metasploit = :D
It's true for WPA2 also, but neither of them are quickly. You'd either have to brute force or run a dictionary/wordlist attack.
|
![]() |
| Thread Tools | |
| Display Modes | Rate This Thread |
|
|
Similar Threads
|
||||
| Thread | Thread Starter | Forum | Replies | Last Post |
| cRio | tomy | Kit & Additional Hardware | 7 | 09-12-2009 06:56 |
| Reimaging the cRio Issues there are no cRio devices on the subnet | Stuart | FRC Control System | 2 | 25-02-2009 23:41 |
| crio | andturn | FRC Control System | 4 | 06-02-2009 11:18 |
| cRIO buzzing | furiousgeorge | FRC Control System | 10 | 30-01-2009 00:15 |
| cRIO feedback | Maxpower57 | C/C++ | 2 | 08-01-2009 19:06 |