Incident: Vulnerabilities in US Military Weapons Systems to Cyber-Attacks.

Published Date: 2018-10-09

Postmortem Analysis
Timeline 1. The software failure incident happened between 2012 to 2017 as reported in Article 76740.
System 1. Nearly all weapon systems developed by the US military from 2012 to 2017 were vulnerable to cyber-attacks due to mission-critical cyber vulnerabilities [76740].
Responsible Organization 1. Testers who were able to hack into the weapons systems during tests, gaining control over them [76740].
Impacted Organization 1. The US military [76740]
Software Causes 1. Vulnerabilities in weapon systems due to mission-critical cyber vulnerabilities found during testing [76740] 2. Use of commercial or open source software with default passwords not changed, allowing easy access for testers [76740]
Non-software Causes 1. Lack of emphasis on cybersecurity during the development of weapon systems [76740] 2. Connectivity of weapon systems to other systems, making them vulnerable to cyber-attacks [76740]
Impacts 1. The vulnerability of nearly all weapons systems developed by the US military from 2012 to 2017 to cyber-attacks has raised concerns about the effectiveness of the billions of dollars invested in these programs [76740]. 2. The ease with which testers were able to hack into weapon systems using simple tools and techniques, gaining full control in a short amount of time, highlights the significant security risks posed by these vulnerabilities [76740]. 3. The lack of emphasis on cybersecurity during the development of these systems has been identified as a key factor contributing to their susceptibility to cyber-attacks, indicating a need for improved security measures in future projects [76740]. 4. The connectivity of these weapons systems to other systems, while advantageous for information exchange and operational efficiency, also serves as a potential entry point for hackers to access multiple systems once they breach a single connected system [76740]. 5. The challenges faced by the Department of Defense in recruiting and retaining skilled cybersecurity professionals and the difficulties in sharing information further complicate efforts to strengthen the defenses of these vulnerable weapons systems [76740].
Preventions 1. Implementing strong password policies and ensuring default passwords are changed during software installation to prevent easy access by hackers [76740]. 2. Conducting thorough cybersecurity testing during the development phase of weapon systems to identify and address vulnerabilities before deployment [76740]. 3. Enhancing network hardening and cybersecurity measures to protect against potential cyber-attacks [76740]. 4. Emphasizing cybersecurity requirements from the early stages of development to ensure that security is a fundamental aspect of the design and implementation of weapon systems [76740].
Fixes 1. Implementing robust cybersecurity measures during the development of weapon systems to prevent vulnerabilities that can be exploited by hackers [76740]. 2. Changing default passwords on commercial or open source software used in weapon systems to prevent unauthorized access [76740]. 3. Enhancing network hardening and cybersecurity protocols to protect critical military information and systems from cyber-attacks [76740]. 4. Strengthening the defensive posture through improved cybersecurity practices, collaboration with international allies, and securing critical information [76740]. 5. Emphasizing cybersecurity awareness and training throughout the institutional culture of the Department of Defense to mitigate risks and enhance overall security [76740].
References 1. Government Accountability Office (GAO) [76740] 2. Pentagon spokesperson Maj. Audricia Harris [76740]

Software Taxonomy of Faults

Category Option Rationale
Recurring one_organization (a) The software failure incident related to vulnerabilities in weapon systems being developed by the US military has happened again within the same organization, the Department of Defense. The Government Accountability Office's report highlighted that from 2012 to 2017, testers routinely found mission-critical cyber vulnerabilities in nearly all weapon systems under development by the Department of Defense [76740]. (b) The software failure incident related to vulnerabilities in weapon systems is not explicitly mentioned to have happened at other organizations in the provided article. Therefore, there is no information available to suggest a similar incident occurring at multiple organizations.
Phase (Design/Operation) design, operation (a) The software failure incident related to the design phase can be seen in the article [76740]. The report by the Government Accountability Office highlighted that during the development of Pentagon weapons systems from 2012 to 2017, testers routinely found mission-critical cyber vulnerabilities in nearly all weapon systems under development. One significant issue was that some weapon systems used commercial or open-source software but did not change the default password when the software was installed, making it easy for test teams to gain administrator privileges by looking up the password on the internet. This design flaw introduced a vulnerability that could be exploited by hackers. (b) The software failure incident related to the operation phase is evident in the same article [76740]. Testers were able to hack into some of the complex weapons systems and take control over them using relatively simple tools and techniques. In one case, a two-person test team managed to gain initial access to a weapon system within one hour and full control within one day. This indicates that the operation or misuse of the systems could lead to significant vulnerabilities and potential cyber-attacks.
Boundary (Internal/External) within_system, outside_system (a) within_system: The software failure incident in the Pentagon weapons systems was primarily due to vulnerabilities originating from within the systems themselves. The report by the Government Accountability Office highlighted that testers were able to hack into the weapons systems and take control over them using relatively simple tools and techniques. One significant issue was the use of commercial or open source software without changing default passwords, which allowed testers to easily gain administrator privileges [76740]. (b) outside_system: The connectivity of the weapons systems to other systems was a contributing factor to the software failure incident. The interconnected nature of the systems made them vulnerable to cyber-attacks, as hackers could potentially access one system and then move on to others through the connecting networks. This external factor of connectivity increased the overall vulnerability of the weapons systems to cyber-attacks [76740].
Nature (Human/Non-human) non-human_actions, human_actions (a) The software failure incident occurring due to non-human actions: The software failure incidents mentioned in the article are primarily attributed to vulnerabilities in the weapon systems themselves, such as using default passwords for commercial or open source software without changing them, which allowed testers to easily gain access and control over the systems [76740]. (b) The software failure incident occurring due to human actions: The article highlights that one of the reasons for the vulnerability of the Pentagon weapons systems to cyber-attacks is the lack of emphasis on cybersecurity during the development of these systems. The report mentions that cyber-security has only recently been emphasized when developing requirements for these systems, indicating a human factor contributing to the software failure incidents [76740].
Dimension (Hardware/Software) hardware, software (a) The software failure incident occurring due to hardware: The article mentions that the vulnerability of the Pentagon weapons systems to cyber-attacks is partly due to their connectivity to other systems, which is seen as an advantage but also makes them vulnerable. The connectivity allows for information exchanges and sharing critical military information, but it also creates a pathway for potential hackers to gain access to multiple systems by penetrating just one connected system [76740]. (b) The software failure incident occurring due to software: The article highlights that the vulnerability of the weapons systems was attributed to mission-critical cyber vulnerabilities found in nearly all weapon systems under development from 2012 to 2017. Testers were able to hack into these systems using relatively simple tools and techniques, such as exploiting default passwords that were not changed during software installation. The use of commercial or open-source software without changing default passwords allowed testers to gain administrator privileges, indicating a software-related vulnerability [76740].
Objective (Malicious/Non-malicious) malicious (a) The software failure incident mentioned in the article is related to malicious intent. The article discusses how Pentagon weapons systems were found to be vulnerable to cyber-attacks, with testers being able to hack into these systems and take control using relatively simple tools and techniques. The vulnerabilities were exploited by testers who gained access to weapon systems by exploiting default passwords and other security weaknesses. This indicates that the failure was due to contributing factors introduced by humans with the intent to harm the system [76740].
Intent (Poor/Accidental Decisions) poor_decisions, accidental_decisions (a) The software failure incident related to poor decisions is evident in the article as it highlights that the weapons systems developed by the US military from 2012 to 2017 were vulnerable to cyber-attacks due to various factors introduced by poor decisions. For example, the article mentions that testers found mission-critical cyber vulnerabilities in nearly all weapon systems under development during that period. One of the reasons for the vulnerability was the use of commercial or open source software without changing default passwords, which allowed testers to easily gain access and control over the systems [76740]. Additionally, the article points out that the emphasis on cybersecurity in the development of these systems was lacking until recently, indicating a poor decision-making process in prioritizing cybersecurity measures [76740]. (b) The software failure incident related to accidental decisions or mistakes is also evident in the article. Testers were able to hack into complex weapons systems and take control over them using relatively simple tools and techniques, indicating vulnerabilities introduced unintentionally due to oversight or lack of proper security measures [76740]. Furthermore, the article mentions that the connectivity of the weapons systems to other systems, although seen as an advantage, made them vulnerable to potential hackers who could exploit these connections to gain access to multiple systems. This unintended consequence of connectivity highlights the accidental decisions or oversights that contributed to the vulnerability of the systems [76740].
Capability (Incompetence/Accidental) development_incompetence, accidental (a) The software failure incident related to development incompetence is evident in the report by the Government Accountability Office, which found that from 2012 to 2017, testers routinely discovered mission-critical cyber vulnerabilities in nearly all weapon systems under development by the Department of Defense [76740]. Testers were able to hack into these complex weapons systems using relatively simple tools and techniques, indicating a lack of robust security measures during the development phase. Additionally, the report highlighted instances where default passwords were not changed during the installation of commercial or open-source software, allowing testers to easily gain administrator privileges by looking up the passwords online [76740]. (b) The software failure incident related to accidental factors is demonstrated by the Pentagon's emphasis on strengthening its defensive posture through network hardening and improved cybersecurity in response to the vulnerabilities discovered in the weapon systems [76740]. The report also mentioned that the connectivity of these systems to other networks, although advantageous for information exchange, inadvertently increased their vulnerability to cyber-attacks. This accidental exposure to potential hackers due to interconnected systems highlights the unintended consequences of the design and development choices made during the creation of these weapons systems [76740].
Duration unknown The articles do not provide specific information about the duration of the software failure incident in terms of being permanent or temporary.
Behaviour crash, omission, other (a) crash: The article mentions that during tests, testers were able to hack into some complex weapons systems and take control over them, indicating a potential crash of the system's intended functions [76740]. (b) omission: The article highlights that in some cases, weapon systems used commercial or open source software but did not change the default password, allowing testers to gain administrator privileges. This omission to change the default password led to a vulnerability in the system [76740]. (c) timing: The article does not specifically mention any failures related to timing issues. (d) value: The article does not provide information about failures due to the system performing its intended functions incorrectly. (e) byzantine: The article does not mention any failures related to the system behaving erroneously with inconsistent responses and interactions. (f) other: The behavior of the software failure incident could also be categorized as a vulnerability due to the system's susceptibility to cyber-attacks, as highlighted in the article [76740].

IoT System Layer

Layer Option Rationale
Perception network_communication, embedded_software The software failure incident reported in the article [76740] is related to the embedded software layer of the cyber physical system. The vulnerability of the Pentagon weapons systems to cyber-attacks was primarily due to issues with the software used in these systems. The report highlighted that some weapon systems used commercial or open source software without changing default passwords, which allowed testers to gain administrator privileges. Additionally, the connectivity of these systems to other networks made them vulnerable to potential hackers, emphasizing the importance of secure embedded software to prevent unauthorized access and control over the systems.
Communication connectivity_level The software failure incident reported in the article [76740] is related to the connectivity level of the cyber physical system that failed. The vulnerability to cyber-attacks in the Pentagon weapons systems was primarily due to their connectivity to other systems, particularly at the network layer. The article mentions that the connectivity of weapons systems like the F-35 Joint Strike Fighter to a range of other systems made them vulnerable to potential hackers who could penetrate one connected system to potentially gain access to others. This connectivity at the network layer facilitated information exchanges for command and control, communications, and battle space awareness, but also increased the system's vulnerability to cyber-attacks.
Application TRUE Based on the provided article [76740], the software failure incident related to the vulnerability of Pentagon weapons systems to cyber-attacks was primarily due to factors related to the application layer of the cyber physical systems. The article mentions that testers were able to hack into these complex weapons systems and take control over them using relatively simple tools and techniques. Specifically, testers were able to gain initial access to a weapon system in just one hour and full control in one day, indicating vulnerabilities at the application layer. Additionally, the report highlighted that some weapon systems used commercial or open source software without changing default passwords, allowing testers to gain administrator privileges easily. These aspects point towards failures at the application layer, including bugs, operating system errors, and incorrect usage contributing to the cyber vulnerabilities of the Pentagon weapons systems.

Other Details

Category Option Rationale
Consequence non-human, theoretical_consequence, unknown (a) unknown (b) unknown (c) unknown (d) [76740] The software failure incident mentioned in the article did not directly result in any property loss or impact on material goods, money, or data. (e) unknown (f) [76740] The software failure incident impacted non-human entities, specifically Pentagon weapons systems, making them vulnerable to cyber-attacks. (g) unknown (h) [76740] The article discusses potential consequences of the software failure incident, such as the vulnerability of Pentagon weapons systems to cyber-attacks, which could have significant implications. (i) unknown
Domain government The software failure incident reported in the article [76740] is related to the government industry. The article discusses how nearly all the weapons systems developed by the US military from 2012 to 2017 were found to be vulnerable to cyber-attacks. The vulnerabilities in these weapon systems were identified by Department of Defense testers, who were able to hack into the systems using relatively simple tools and techniques. The report highlights that the connectivity of these weapons systems to other systems makes them susceptible to cyber-attacks, as hackers could potentially access multiple systems through interconnected networks. The Pentagon is taking steps to improve its understanding of these vulnerabilities and enhance cybersecurity measures to secure critical information in the defense sector.

Sources

Back to List