Researchers identify 23 vulnerabilities, some of which can exploited with no authentication.
See full article...
See full article...
Needs a substitution.121 comments and there's still a wrench in the subtitle? "Can exploited"?
I had to go looking for this comment, because it's exactly right. There's a number of articles even here on Ars mentioning recalls for improperly torqued seatbelts. Manufactures use the logs from these tools to identify which vehicles need to be inspected/repaired, instead of needing to recall every single vehicle. These kinds of tools make stuff better, cheaper, and easier to identify when something is wrong.Comments in this thread are pretty bad. You've got a mix of "heh i use vlans" "a network connected huh?" and "a clicking torque wrench is just as good"
None of these are relevant, obviously. If you research the devices, it's not just about turning a bolt like it's a car on the weekend. These are used on products with millions of fasteners. No one can remember the specs of each one. These devices can scan bar/QR codes to be set to the proper torque values every single time. That is then logged every single time, what was turned, when it was turned, how it was turned. It also has the ability to sanity check its work. and alert/diagnose any issues with the device.
These functionalities are not something you can recreate with something off a network, sorry. And for all the VLAN/segmented network comments, it's absolutely silly to think these things aren't segregated at these manufacturers.
Being aware of security risks is obviously an issue. These should clearly be fixed. But the existence of security risks is not a reason to never connect anything to any network, as some of the comments would have you believe. Ironically, most of the solutions in this thread for dumber or less connected devices would make them much more difficult to update to fix these vulnerabilities, but they would still have them.
Ah ha! found it. Hopefully Dan G highlights this comment to avoid further "hur-hur-hur IoT wat?!?"Comments in this thread are pretty bad. You've got a mix of "heh i use vlans" "a network connected huh?" and "a clicking torque wrench is just as good"
None of these are relevant, obviously. If you research the devices, it's not just about turning a bolt like it's a car on the weekend. These are used on products with millions of fasteners. No one can remember the specs of each one. These devices can scan bar/QR codes to be set to the proper torque values every single time. That is then logged every single time, what was turned, when it was turned, how it was turned. It also has the ability to sanity check its work. and alert/diagnose any issues with the device.
These functionalities are not something you can recreate with something off a network, sorry. And for all the VLAN/segmented network comments, it's absolutely silly to think these things aren't segregated at these manufacturers.
Being aware of security risks is obviously an issue. These should clearly be fixed. But the existence of security risks is not a reason to never connect anything to any network, as some of the comments would have you believe. Ironically, most of the solutions in this thread for dumber or less connected devices would make them much more difficult to update to fix these vulnerabilities, but they would still have them.
This isn't the Flintstones/Jetsons crossover I had in mind.
It would not surprise me to learn that Iranian engineers putting together centrifuges for refining uranium use them.Wonder who could use one of those? ;-)
Bosch officials emailed a statement that included the usual lines about security being a top priority.
There actually is a reason for it, just... not what I consider a good enough one. Those preset torque levels could have easily been set and updated without a network connection involved. It was a security vulnerability just asking to be exploited.I didn't make it past the first paragraph. Network connected wrenches... this really is the dumbest timeline.
Well, as one of those "a clicking torque wrench is just as good" people, that kind of answers my questions about it, but can you give an example? What kind of product has millions of fasteners that all have unique torque values? And even in those situations you'd think any one technician would only be working with a certain set of fasteners in a given day that they could remember or quickly refer to a cheat sheet, which brings you back to the clicky torque wrench.Comments in this thread are pretty bad. You've got a mix of "heh i use vlans" "a network connected huh?" and "a clicking torque wrench is just as good"
None of these are relevant, obviously. If you research the devices, it's not just about turning a bolt like it's a car on the weekend. These are used on products with millions of fasteners. No one can remember the specs of each one. These devices can scan bar/QR codes to be set to the proper torque values every single time. That is then logged every single time, what was turned, when it was turned, how it was turned. It also has the ability to sanity check its work. and alert/diagnose any issues with the device.
These functionalities are not something you can recreate with something off a network, sorry. And for all the VLAN/segmented network comments, it's absolutely silly to think these things aren't segregated at these manufacturers.
Being aware of security risks is obviously an issue. These should clearly be fixed. But the existence of security risks is not a reason to never connect anything to any network, as some of the comments would have you believe. Ironically, most of the solutions in this thread for dumber or less connected devices would make them much more difficult to update to fix these vulnerabilities, but they would still have them.
The design of this wrench apparently assumes that it must be connected to some kind of network at the same time it is being used. I do not agree with this assumption. Specified torque values and logging per bolt could be accomplished using only local [on wrench] memory. At the end of the shift, the wrench would be docked. This dock would charge the battery and connect to isolated local network by RJ-45. Logs could be uploaded, torque settings for the next shift could be downloaded and saved, and this would be a good time for some self testing. The user interface for the wrench would be disabled while connected to charger and/or network.I mean, having timestamped verification of when, where, and how a bolt was installed seems to be a huge benefit for aerospace, since being able to track the most minute part back to it's raw materials is the expected level of logging. Vulnerabilities aside, this is saving techs time that they don't need to spend on paperwork, removing overhead and increasing productivity, while reducing tolerance drift over the day without adding calibration time.
It really feels like someone with no knowledge of cybersecurity had a pretty good idea but it was implemented poorly.
I don’t think anyone serious would rely on an air gapped lan and nothing else. But a layered defence uses layers that aren’t foolproof, because none exist.
This used to be the way a lot of these kind of devices worked - you hotsynced them at some interval. The problem is, if you lose the data, you probably have to go back and scrap, or at least redo, a hell of a lot of work (if you can even identify what was affected).The design of this wrench apparently assumes that it must be connected to some kind of network at the same time it is being used. I do not agree with this assumption. Specified torque values and logging per bolt could be accomplished using only local [on wrench] memory. At the end of the shift, the wrench would be docked. This dock would charge the battery and connect to isolated local network by RJ-45. Logs could be uploaded, torque settings for the next shift could be downloaded and saved, and this would be a good time for some self testing. The user interface for the wrench would be disabled while connected to charger and/or network.
This would not be a perfect solution, and the implementation is likely more complex than I imagine.
I just wonder if this was even considered.
How is that better, though? Oh, it’s got an RJ-45 connection to the network? The network connection is temporary? Neither of those provide any meaningful security value.The design of this wrench apparently assumes that it must be connected to some kind of network at the same time it is being used. I do not agree with this assumption. Specified torque values and logging per bolt could be accomplished using only local [on wrench] memory. At the end of the shift, the wrench would be docked. This dock would charge the battery and connect to isolated local network by RJ-45. Logs could be uploaded, torque settings for the next shift could be downloaded and saved, and this would be a good time for some self testing. The user interface for the wrench would be disabled while connected to charger and/or network.
This would not be a perfect solution, and the implementation is likely more complex than I imagine.
I just wonder if this was even considered.
No, I’m just explaining how many executives will see it. Unless the cost of using these products with poor security is greater than the cost of more employees, the employees will continue to get pink slips. I don’t like it, but that’s economics.So you wanna get hacked uh?
It is easier to do a MITM attack against a wireless, always on device, and it is easier in general to do attacks against devices that are always connected.How is that better, though? Oh, it’s got an RJ-45 connection to the network? The network connection is temporary? Neither of those provide any meaningful security value.
These are run on private LANs. If you’ve got access to the private LAN sufficient to attack one of these devices, the only difference will be whether or not you have access to a zero-day that can operate through whatever interface the device uses.It is easier to do a MITM attack against a wireless, always on device, and it is easier in general to do attacks against devices that are always connected.
We have taken control of your device. It will not release your private part until we receive your bitcoin payment.I weep for the sex toys of the future.
If you’ve ever used a torque wrench that reports the actual torque you just applied, you know that you’re not really that accurate with your clicky wrench. It’s close enough for stuff like lug nuts, but when tolerances are really tight it’s not good enough. The fact that the examples in the article were of 0.054 and 0.15 Nm indicates that we‘re looking at very small values here.Well, as one of those "a clicking torque wrench is just as good" people, that kind of answers my questions about it, but can you give an example? What kind of product has millions of fasteners that all have unique torque values? And even in those situations you'd think any one technician would only be working with a certain set of fasteners in a given day that they could remember or quickly refer to a cheat sheet, which brings you back to the clicky torque wrench.
Internet connected chastity cages with ransomware is a real world thing…pretty sure some of those are probably already connected to the internet.
But i still dont see the need for these to be connected to the Internet. At best, it should be connected to a server in the facility. AT BEST.
I hate this timeline.
I did hear they were instigating an open door policyWhat Boeing actually wants to know is when they will add the automated press release generator upon torquing the SLS bolt.
They hired some guy whose experience was gleaned from stackoverflow.comWas this software developed in the '90? Because the vulnerability list reads like that. This was developed without ANY of basic the programming rules of the last 20 years. I mean every vulnerability class is on the list: SQL injection, hardcoded credentials, stack and heap overflows, you name it.
Even stackoverflow is full on methods how to safely protect against SQL injection.They hired some guy whose experience was gleaned from stackoverflow.com
Mostly confined to questions asking how to avoid it. A lot of the popular answers to questions that use SQL tend to do it the wrong way with the assumption that the consumer of the answer knows that you need to do additional work to mitigate SQL injection.Even stackoverflow is full on methods how to safely protect against SQL injection.
I check in on stories like this to get a reality check-on the sentiment of others, regarding networked-device vulnerabilities. I'm heartened to see that at least the Ars community feels the same way.
But more than that I'm looking for signs that the general public (or at least a significant slice) starts pushing for more private network solutions, if they're necessary at all. I personally have isolated networks in my house for such functions as security cameras (no way they're connecting to the Internet), gate-unlock, and media library. And as most people here know, it is a pain in the ass to maintain such things when most products choose the lazy path and rely on the Internet for all connectivity.
On the one hand I would think that industries with a lot at stake would lead this charge, but then stories like this come along and demonstrate that no, we're never going to learn a damned thing, no matter how many times this comes up.
This sentence feels a bit out of context. That could be one outcome of a fastener that is too loose, but it's very context dependent. Apparently another outcome could be a section of plane falling off (hey, if feels like too long since we've stuck it to Boeing...) Inadequately torqued fasteners are never good, but fire risk isn't always the consequence.When fastenings are too loose, they risk causing the device to overheat and start fires.
Someone who knew exactly what they were doing, of course.Hand-held nut runner?
Who names these things?