Investigation Reveals Status of Software Provision in Operational Technology and Internet of Things (IoT) Router Sector
In a recent joint report by Forescout Technologies and Finite State, titled "Rough Around the Edges," the state of software supply chain in operational technology (OT) and internet of things (IoT) routers has been analyzed, revealing a number of concerning findings.
The report underscores the critical importance of addressing software supply chain risks to protect against known vulnerabilities. The analysis found a positive correlation between the age of components, the number of known vulnerabilities, and binary hardening practices among vendors.
Four of the five firmware analyzed run heavily modified versions of OpenWrt, an open-source Linux-based OS for embedded devices. Popular OT/IoT router firmware images had an average of 20 exploitable n-day vulnerabilities affecting the kernel. On average, firmware images had 161 known vulnerabilities on their most common components.
The research found that OT and IoT cellular routers, as well as those used in small offices and homes, have outdated software components linked to existing (n-day) vulnerabilities. The key findings from the research included that all five vendors had at least one exploitable n-day vulnerability in their firmware.
Daniel dos Santos, Head of Research at Forescout, stated that threats targeting connected devices are increasing exponentially due to cybercriminal botnets, nation-state APT's, and hacktivists. Default credentials were often uniquely generated and required changing upon device configuration, making them not exploitable under normal circumstances.
However, the research found examples of vendors applying their own patches to known vulnerabilities and introducing new issues. The report emphasized the importance of regularly updating and securing OT/IoT routers to protect against known vulnerabilities.
Binary hardening practices were also assessed, with 41% of binaries across firmware images using RELRO, 31% using stack canaries, 65% using NX, 75% using PIE, 4% using RPath, and 35% having debugging symbols. Firmware with newer components tends to have fewer vulnerabilities and better binary protections.
Forescout's recent Sierra:21 research found tens of thousands of devices with outdated firmware exposed online, easily accessible to hackers. The widening security gaps in the analyzed OT/IoT routers are a cause for concern, potentially leading to significant security breaches if not addressed promptly.
The five manufacturers of OT/IoT router firmware images examined in the Forescout report "Rough Around the Edges" are not identified in the provided search results. The report aimed to understand the state of software components in OT/IoT network devices from other vendors and potential threats that could be uncovered by looking more closely at this software supply chain.
In conclusion, the report serves as a stark reminder of the need for vigilance in securing OT/IoT devices. Regular updates, careful patching, and strong binary protections are essential to mitigate the risks posed by outdated and vulnerable software components in these devices.
Read also:
- Unveiling the Less-Discussed Disadvantages of Buds - Revealing the Silent Story
- Criminal elements are reportedly employing covert malware to infiltrate government systems
- Businesses require a fresh approach to cyber defense, according to a cybersecurity expert.
- Intelligence leaders gather under Doval's leadership to counteract terrorism