Home IT Info News Today Security Vulnerabilities Discovered in Airline In-Flight Enterta…

Security Vulnerabilities Discovered in Airline In-Flight Enterta…

234

Security firm IOactive finds multiple security flaws in Panasonic’s Avionic In-Flight Entertainment (IFE) system that could potentially give an attacker unauthorized access.

Security firm IOactive on December 20 publicly announced that it has found multiple security flaws in Panasonic Avionic In-Flight Entertainment (IFE) systems used on multiple airlines around the world. The flaws were first reported to Panasonic by IOactive in March 2015 and were not publicly discussed until today, in an effort to give Panasonic and airlines time to fix the issues.
According to IOactive, Panasonic said that it would notify its airline customers of the issues, as such IOactive did not disclose the vulnerabilities to any airlines directly. IOactive also alerted Aviation Information Sharing and Analysis Center (A-ISAC) members last week ahead of public announcement, so those potentially impacted could prepare for the news going public.
The vulnerabilities discovered by IOactive could have potentially enabled an attacker to take over in-flight displays used by passengers, turn the lighting system on or off as well as steal credit card information that may be stored in the system. There is also the potential risk that that vulnerabilities found by IOactive could be chained together and enable an attacker to get wider access to an aircraft’s in-flight systems.
Hacking into IFE systems is not something that airlines take likely. In 2015, security researcher Chris Roberts claimed that he was able to hack into an aircraft’s flight control through an IFE system, which led to an FBI investigation. Unlike Roberts, who tweeted his claims while on an aircraft, IOactive’s security researcher took a different approach.

“The bugs were not exploited, they were only identified with simple and inoffensive tests,” Ruben Santamarta, Principal Security Consultant at IOActive, told eWEEK.

In terms of the actual technology components, an IFE system includes both Seat Display Units which is what passengers interact with, and the System Control Unit, which is what airline staff use to control the IFE system. Santamarta explained that the Seat Display Units are basically embedded devices, running their own operating system, usually Linux or Android.
“The vulnerabilities are located on both server and client components,” he said.
Looking at the actual vulnerabilities, Santamarta explained that some of the vulnerabilities he discovered are data input sanitization issues. Data input sanitization refers to a program’s ability to only accept proper inputs. Without proper data input sanitization, SQL injection and other forms of security techniques can potentially be used to exploits a system. Other issues that Santamarta found include a lack of authenticated encryption during network operations and the use hardcoded credentials.
Getting access to the IFE system to exploit the vulnerabilities is not a trivial task either. Aircraft passengers typically only have access to the IFE system via Wi-Fi, which is not necessarily a method by which the IOactive vulnerabilities can be exploited.
“We can’t discard the Wi-Fi scenario but due to the limitations of our analysis, which was mainly based on static analysis approaches, the attacker would need physical access,” Santamarta said.
An additional barrier for any potential IFE system hacker is the fact that airlines implement a very segmented approach to on-board systems. As such the IFE system is supposed to be separate from other on-board systems. Simply isolating each individual Wi-Fi client and Seat Display Unit however isn’t enough to thoroughly guarantee security.
“A more complex approach needs to be implemented to mitigate the risks,” Santamarta said. “Eventually, it would be simpler to fix the code.”
Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com. Follow him on Twitter @TechJournalist

Source link

LEAVE A REPLY

Please enter your comment!
Please enter your name here