Incident: Vulnerabilities in Smart City Sensor Hubs Lead to Critical Flaws

Published Date: 2018-08-09

Postmortem Analysis
Timeline 1. The software failure incident happened in August 2018. [74304]
System 1. Sensor hubs from three companies - Libelium, Echelon, and Battelle [74304]
Responsible Organization 1. Researchers from IBM Security and data security firm Threatcare [74304]
Impacted Organization 1. Municipal works and public safety sensors were impacted by the software failure incident [74304].
Software Causes 1. Vulnerabilities in sensor hubs from companies like Libelium, Echelon, and Battelle were identified, including guessable default passwords, bugs allowing injection of malicious software commands, and authentication bypass flaws [74304].
Non-software Causes 1. Lack of proper security and privacy measures in place for smart city devices [74304] 2. Use of guessable default passwords on devices making it easy for attackers to access them [74304] 3. Vulnerabilities in smart city products due to bugs that could allow attackers to inject malicious software commands [74304] 4. Vulnerabilities in smart city products allowing attackers to sidestep authentication checks [74304] 5. Exposure of devices publicly on the open internet, potentially leaving them vulnerable to attacks [74304]
Impacts 1. The software failure incident exposed vulnerabilities in sensor hubs used in smart city schemes, potentially allowing manipulation that could destabilize traffic lights, undermine radiation sensors, or cause calamities like dam overflows due to tainted water level data [74304]. 2. Researchers found a total of 17 new vulnerabilities in products from three companies, including eight critical flaws, which could allow attackers to access devices, inject malicious software commands, and sidestep authentication checks [74304]. 3. The incident highlighted the risks associated with smart city devices being connected to the open internet, potentially leaving them exposed publicly for anyone to find [74304]. 4. The vulnerabilities discovered in the smart city hubs required patches to be made available by the companies, emphasizing the importance of raising awareness and prioritizing patching to prevent potential exploitation of the flaws [74304].
Preventions 1. Implementation of strong security measures such as unique and non-guessable passwords for devices [74304]. 2. Regular security audits and vulnerability assessments to identify and address potential flaws [74304]. 3. Utilization of internal city networks instead of the open internet for connecting sensors to enhance security [74304]. 4. Incorporation of automatic update capabilities in smart city hubs to ensure timely patching of vulnerabilities [74304]. 5. Increased awareness and prioritization of patching by municipalities to address security issues promptly [74304].
Fixes 1. Patches have been made available for all 17 bugs found in the smart city hubs, which is a crucial step in fixing the software failure incident [74304]. 2. Raising awareness about these vulnerabilities to ensure municipalities prioritize patching is important to address the software failure incident [74304]. 3. Proactively applying the patches by every entity using these products is necessary to prevent devices in the wild from remaining vulnerable [74304].
References 1. IBM Security and data security firm Threatcare [74304] 2. Echelon [74304] 3. Battelle [74304] 4. Libelium [74304]

Software Taxonomy of Faults

Category Option Rationale
Recurring one_organization, multiple_organization (a) The software failure incident related to vulnerabilities in smart city sensor hubs has happened again at Echelon, one of the companies involved. Researchers found a total of 17 new vulnerabilities in products from Echelon, including eight critical flaws. Echelon confirmed the vulnerability, developed mitigation solutions, and collaborated with IBM to resolve the issues [74304]. (b) The software failure incident related to vulnerabilities in smart city sensor hubs has also happened at other organizations. Researchers found vulnerabilities in products from three companies: Libelium, Echelon, and Battelle. These vulnerabilities included basic flaws like guessable default passwords, bugs allowing injection of malicious software commands, and authentication bypasses. The three companies have made patches available for all 17 bugs [74304].
Phase (Design/Operation) design, operation (a) The software failure incident related to the design phase is evident in the vulnerabilities found in sensor hubs used in smart city schemes. Researchers from IBM Security and Threatcare discovered 17 new vulnerabilities in products from three companies - Libelium, Echelon, and Battelle - including critical flaws like guessable default passwords, bugs allowing injection of malicious software commands, and authentication bypasses [74304]. (b) The software failure incident related to the operation phase is highlighted by the fact that many smart city schemes connect sensors or relay data to the cloud using the open internet, potentially exposing devices publicly. Simple checks on IoT crawlers like Shodan and Censys revealed thousands of vulnerable smart city products deployed in the wild, indicating operational vulnerabilities due to the way these systems are set up and managed [74304].
Boundary (Internal/External) within_system, outside_system (a) within_system: The software failure incident discussed in the article is primarily within the system. The vulnerabilities and flaws identified in the smart city sensor hubs from companies like Libelium, Echelon, and Battelle were due to issues such as guessable default passwords, bugs allowing injection of malicious commands, and authentication bypasses [74304]. These vulnerabilities were inherent to the design and implementation of the systems themselves, making them vulnerable to exploitation from within the system. (b) outside_system: The software failure incident also involves factors originating from outside the system. The use of open internet connections for smart city devices and sensors, instead of internal networks, exposed these devices publicly and made them susceptible to attacks from external sources [74304]. Additionally, the article mentions the presence of exploits for the identified flaws on hacker forums, indicating that external threat actors could potentially exploit these vulnerabilities [74304].
Nature (Human/Non-human) non-human_actions, human_actions (a) The software failure incident in the articles is primarily related to non-human actions, specifically vulnerabilities in sensor hubs used in smart city schemes. Researchers from IBM Security and Threatcare found 17 new vulnerabilities in products from three companies that sell systems to underpin smart city schemes, including guessable default passwords, bugs allowing injection of malicious software commands, and authentication bypass flaws. These vulnerabilities could potentially be exploited to manipulate data passing through the sensor hubs, leading to risks in public safety and management of industrial control systems [74304]. Additionally, the smart city hubs analyzed by the researchers do not have automatic update capabilities, which means entities using these products need to proactively apply patches to prevent vulnerabilities, highlighting a non-human factor contributing to the software failure incident [74304]. (b) While the software failure incident is primarily attributed to non-human actions, there is also a human element involved in the incident. The vulnerabilities found in the smart city sensor hubs were identified by researchers from IBM X-Force Red and Threatcare, who conducted the analysis in response to incidents like the accidental missile alert in Hawaii and the hack that set off tornado sirens in Dallas. The researchers emphasized the importance of raising awareness about these vulnerabilities to ensure that municipalities prioritize patching, as organizations often fail to do so. They also noted that someone posted an exploit for one of the flaws on a hacker forum in August 2015, indicating potential human actions contributing to the exploitation of software vulnerabilities [74304].
Dimension (Hardware/Software) hardware, software (a) The software failure incident reported in the articles is primarily related to hardware vulnerabilities in smart city sensor hubs. Researchers from IBM Security and Threatcare found 17 new vulnerabilities in products from companies like Libelium, Echelon, and Battelle, including critical flaws. These vulnerabilities included issues like guessable default passwords, bugs allowing injection of malicious software commands, and authentication bypasses [74304]. (b) The software failure incident also involves software vulnerabilities in the smart city sensor hubs. The vulnerabilities discovered by the researchers included flaws that could allow an attacker to inject malicious software commands and bypass authentication checks. The companies involved have released patches to address the software vulnerabilities identified [74304].
Objective (Malicious/Non-malicious) malicious (a) The software failure incident discussed in the articles is malicious in nature. Researchers from IBM Security and data security firm Threatcare discovered 17 new vulnerabilities in products from three companies that sell systems for smart city schemes. These vulnerabilities included critical flaws such as guessable default passwords, bugs allowing injection of malicious software commands, and authentication bypasses. The vulnerabilities could potentially be exploited by attackers to manipulate information, compromise public safety systems, and cause damage to life and livelihood [74304]. Additionally, the articles mention that someone posted an exploit for one of the flaws on a hacker forum in August 2015, indicating that malicious actors may have already been aware of and potentially exploiting these vulnerabilities [74304]. (b) The software failure incident is non-malicious in the sense that the vulnerabilities were not intentionally introduced to harm the system. The companies involved, such as Echelon, Battelle, and Libelium, collaborated with IBM to resolve the issues and released patches for all 17 bugs. Echelon confirmed the vulnerabilities, developed mitigation solutions, and notified customers and relevant authorities. Battelle appreciated IBM's feedback and assistance in improving the security of their open source smart city hub collaboration. Libelium promptly addressed the web vulnerabilities found in their Meshlium Manager System upon being informed by IBM, releasing a new software version to fix the detected flaws [74304].
Intent (Poor/Accidental Decisions) poor_decisions, accidental_decisions (a) The intent of the software failure incident related to poor decisions can be seen in the article where it mentions that vulnerabilities were found in smart city sensor hubs from three companies - Libelium, Echelon, and Battelle. These vulnerabilities included basic issues like guessable default passwords, bugs allowing injection of malicious commands, and bypassing authentication checks. Additionally, many smart city schemes were found to use the open internet instead of internal networks, potentially exposing devices publicly. The lack of proper security measures and the decision to use vulnerable devices in critical infrastructure like public safety and industrial control systems highlight poor decisions that can lead to significant consequences [74304]. (b) The intent of the software failure incident related to accidental decisions is evident in the accidental missile alert in Hawaii and the hack that set off Dallas's tornado sirens. These incidents, along with others, prompted researchers to investigate vulnerabilities in smart city systems. The accidental nature of these incidents and the subsequent investigation by IBM X-Force Red and Threatcare indicate that the failures were not intentional but rather a result of unintended consequences or mistakes [74304].
Capability (Incompetence/Accidental) development_incompetence, accidental (a) The software failure incident in the articles can be attributed to development incompetence. Researchers from IBM Security and data security firm Threatcare found a total of 17 new vulnerabilities in products from three companies that sell systems for smart city schemes. These vulnerabilities included basic issues like guessable default passwords, bugs allowing injection of malicious software commands, and flaws enabling attackers to bypass authentication checks [74304]. (b) The software failure incident can also be categorized as accidental. For example, an accidental missile alert in Hawaii and a hack setting off tornado sirens in Dallas were mentioned as incidents that inspired the researchers to investigate vulnerabilities in smart city systems. The vulnerabilities found in the smart city hubs were not intentionally created but were present due to lack of proper security measures and privacy controls, potentially leading to serious consequences if exploited by motivated attackers [74304].
Duration temporary The software failure incident discussed in the articles is more aligned with a temporary failure rather than a permanent one. This is evident from the fact that vulnerabilities were identified in products from three companies, including critical flaws, and patches were made available for all 17 bugs [74304]. The incident involved specific vulnerabilities that were introduced by certain circumstances (such as guessable default passwords, bugs allowing injection of malicious commands, and authentication bypass) and were addressed through patches, indicating a temporary nature of the failure.
Behaviour omission, value, other (a) crash: The software failure incident mentioned in the articles did not specifically describe a crash where the system loses state and does not perform any of its intended functions. (b) omission: The incident involved vulnerabilities in smart city sensor hubs that could allow attackers to manipulate information being passed around, potentially causing damage to life and livelihood if the systems fail to perform their intended functions [74304]. (c) timing: The articles did not mention any failure related to timing, where the system performs its intended functions but at incorrect times. (d) value: The vulnerabilities found in the smart city sensor hubs could lead to the system performing its intended functions incorrectly, such as allowing attackers to inject malicious software commands or sidestep authentication checks [74304]. (e) byzantine: The software failure incident described in the articles did not exhibit a byzantine behavior where the system behaves erroneously with inconsistent responses and interactions. (f) other: The other behavior observed in the incident was the potential exposure of smart city products to the public internet, leaving devices vulnerable to exploitation by anyone who finds them [74304].

IoT System Layer

Layer Option Rationale
Perception sensor, network_communication, embedded_software (a) sensor: The software failure incident mentioned in the articles is related to vulnerabilities found in sensor hubs used in smart city schemes. Researchers found 17 new vulnerabilities in products from companies like Libelium, Echelon, and Battelle, including critical flaws. These vulnerabilities could allow attackers to manipulate information being passed around, inject malicious software commands, and sidestep authentication checks, potentially causing damage to life and livelihood [74304]. (b) actuator: The articles do not specifically mention any failures related to actuators in the smart city schemes or the vulnerabilities found in the sensor hubs. (c) processing_unit: The articles do not mention any failures related to the processing unit or processing errors in the smart city schemes or the vulnerabilities found in the sensor hubs. (d) network_communication: The software failure incident discussed in the articles highlights vulnerabilities in smart city products that are connected to the open internet, potentially leaving devices exposed publicly. Simple checks on IoT crawlers like Shodan and Censys revealed thousands of vulnerable smart city products deployed in the wild, indicating a risk related to network communication errors [74304]. (e) embedded_software: The vulnerabilities found in the sensor hubs of smart city schemes, as reported in the articles, include basic vulnerabilities like guessable default passwords, bugs allowing injection of malicious software commands, and flaws enabling attackers to sidestep authentication checks. These vulnerabilities point to potential issues with the embedded software in these devices [74304].
Communication link_level, connectivity_level The software failure incident discussed in the articles is related to vulnerabilities found in sensor hubs used in smart city schemes. These vulnerabilities could potentially lead to manipulation of data that could impact public safety and critical infrastructure. The vulnerabilities included basic issues like guessable default passwords, bugs allowing injection of malicious commands, and bypassing authentication checks. Additionally, the smart city products were found to be exposed publicly on the internet, making them vulnerable to exploitation [74304]. This incident involves failures at both the communication layers of the cyber-physical system. At the link level, vulnerabilities like guessable default passwords and bugs allowing injection of malicious commands could be considered contributing factors introduced by the physical layer. At the connectivity level, issues like bypassing authentication checks and exposure of devices on the open internet could be seen as contributing factors introduced by the network or transport layer.
Application TRUE The software failure incident described in the articles [74304] was related to vulnerabilities found in sensor hubs used in smart city schemes. These vulnerabilities included basic issues like guessable default passwords, bugs allowing injection of malicious commands, and flaws enabling bypassing authentication checks. These issues are characteristic of failures at the application layer of the cyber physical system, as they involve bugs and security vulnerabilities that could lead to manipulation of data and compromise of critical systems like traffic lights and radiation sensors.

Other Details

Category Option Rationale
Consequence death, harm, property, non-human, theoretical_consequence (a) death: The article mentions the potential consequences of software failures in smart city systems, such as causing damage to life and livelihood. It gives examples of incidents like an accidental missile alert in Hawaii and a hack setting off tornado sirens in Dallas, which could have led to significant harm or even loss of life [74304].
Domain information, government, other (a) The failed system was intended to support the industry of information. The incident involved vulnerabilities in sensor hubs used in smart city schemes, which monitor various data points like weather, air quality, traffic, radiation, and water levels to provide insights for solving interconnected problems [74304]. (b) The incident did not directly involve the transportation industry. (c) The incident did not directly involve the natural resources industry. (d) The incident did not directly involve the sales industry. (e) The incident did not directly involve the construction industry. (f) The incident did not directly involve the manufacturing industry. (g) The incident did not directly involve the utilities industry. (h) The incident did not directly involve the finance industry. (i) The incident did not directly involve the knowledge industry. (j) The incident did not directly involve the health industry. (k) The incident did not directly involve the entertainment industry. (l) The incident indirectly involved the government industry as it pertained to smart city schemes and public safety sensors that could impact public services like traffic lights, radiation sensors, and emergency alerts [74304]. (m) The incident was related to the smart city technology industry, which could be considered under the "other" category as it involves the deployment of IoT devices and sensor hubs for urban infrastructure management [74304].

Sources

Back to List