{"id":36637,"date":"2022-06-10T06:02:00","date_gmt":"2022-06-10T06:02:00","guid":{"rendered":"https:\/\/cloudnewshub.com\/archives\/36637"},"modified":"2022-06-10T06:02:00","modified_gmt":"2022-06-10T06:02:00","slug":"researchers-find-eight-cves-in-single-building-access-system","status":"publish","type":"post","link":"https:\/\/cloudnewshub.com\/?p=36637","title":{"rendered":"Researchers find eight CVEs in single building access system"},"content":{"rendered":"<div><img decoding=\"async\" src=\"http:\/\/cloudnewshub.com\/wp-content\/uploads\/2022\/06\/researchers-find-eight-cves-in-single-building-access-system.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>A series of eight newly designated common vulnerabilities and exposures (CVEs) in a building access control system built by HID Mercury and sold by <a href=\"https:\/\/www.carrier.com\/commercial\/en\/uk\/\">Carrier<\/a> \u2013 a global supplier of building systems for physical security, HVAC, and so on \u2013 could enable attackers to obtain full system control and remotely manipulate door locks, according to researchers at <a href=\"https:\/\/www.trellix.com\/en-us\/threat-center.html\">Trellix Threat Labs<\/a>.<\/p>\n<p>The Trellix vulnerability research team, which has a special interest in threats to <a href=\"https:\/\/www.techtarget.com\/whatis\/definition\/operational-technology\">operational technology<\/a> (OT) and <a href=\"https:\/\/www.techtarget.com\/whatis\/definition\/industrial-control-system-ICS\">industrial control systems<\/a> (ICS), conducted its research on Carrier\u2019s LenelS2 access control panels, which are used by organisations across multiple verticals, including healthcare, education, transport and the public sector. In the US, notably, this product is approved for use at federal government properties.<\/p>\n<p>Trellix\u2019s team said it chose to work with this specific access control panel because it is in widespread use across critical industries, has a strong market position, and has been certified as secure.<\/p>\n<p>\u201cFor this project, we anticipated a strong potential for finding vulnerabilities, knowing that the access controller was running a Linux operating system and root access to the board could be achieved by leveraging classic hardware hacking techniques,\u201d <a href=\"https:\/\/www.trellix.com\/en-gb\/about\/newsroom\/stories\/threat-labs\/trellix-threat-labs-uncovers-critical-flaws.html\">the team said in a disclosure blog<\/a>.<\/p>\n<p>\u201cWhile we believed flaws could be found, we did not expect to find common, legacy software vulnerabilities in a relatively recent technology.\u201d<\/p>\n<p>The team combined a number of known and novel techniques to hack the control panels using a phased approach \u2013 first using hardware hacking techniques to use on-board debugging ports to force the system into desired states that bypass security measures. This enabled them to achieve root access to the operating system, to pull its firmware and modify startup scripts to gain persistent access.<\/p>\n<p>With both firmware and system binaries to hand, the team then moved on to software accessible from the underlying network. Via a combination of reverse engineering and live debugging, they found six unauthenticated and two authenticated vulnerabilities that they could exploit remotely.<\/p>\n<p>From there, they were able to chain two of those vulnerabilities to exploit the access control board and gain remote root level privileges on the device. This allowed them to create and run their own program to unlock any controlled doors and subvert system monitoring.<\/p>\n<p>\u201cThe vulnerabilities uncovered allowed us to demonstrate the ability to remotely unlock and lock doors, subvert alarms and undermine logging and notification systems,\u201d they said. \u201cThe highest CVE, an unauthenticated <a href=\"https:\/\/www.techtarget.com\/searchwindowsserver\/definition\/remote-code-execution-RCE\">remote code execution<\/a> (RCE), received a base score of 10 CVSS, the maximum score for a vulnerability.\u201d<\/p>\n<p>The full list of vulnerabilities is as follows:<\/p>\n<ul class=\"default-list\">\n<li>CVE-2022-31479, an unauthenticated command injection vulnerability.<\/li>\n<li>CVE-2022-31480, an unauthenticated denial-of-service vulnerability.<\/li>\n<li>CVE-2022-31481, the above-mentioned CVSS 10 rated RCE vulnerability.<\/li>\n<li>CVE-2022-31482, an unauthenticated denial-of-service vulnerability.<\/li>\n<li>CVE-2022-31483, an authenticated arbitrary file write vulnerability.<\/li>\n<li>CVE-2022-31484, an unauthenticated user modification vulnerability.<\/li>\n<li>CVE-2022-31485, an unauthenticated information spoofing vulnerability.<\/li>\n<li>CVE-2022-31486, an authenticated command injection vulnerability.<\/li>\n<\/ul>\n<p>In response to the disclosure, <a href=\"https:\/\/www.corporate.carrier.com\/Images\/CARR-PSA-HID-Mercury-Vulnerabilities-006-0622_tcm558-170514.pdf\">Carrier has published an advisory<\/a> with further specifics, mitigations and firmware updates, which users should apply immediately. &nbsp;<\/p>\n<p>Also, HID Global has since confirmed that all OEM partners using Mercury boards will be vulnerable to these issues on specific hardware controller platforms, and the research is also actionable for suppliers and third parties that work with Carrier to install access systems. End-users using these boards should contact their OEM partner for access to patches.<\/p>\n<p>According to a 2021 IBM study, physical security breaches cost over $3.5m on average, and can take up to seven months to be identified. Also, because OT and IT systems are increasingly convergent, exploitation opportunities for threat actors become more frequent, and consequences more severe, particularly if a compromised system is operated by a critical national infrastructure (CNI) provider, such as a household utility or telecoms network.<\/p>\n<p>\u201cWhile the stakes are already high, they are still growing,\u201d said Trellix\u2019s team. \u201cSupporting organisations to get ahead of threats to industrial systems is a national security imperative. Groups like CISA have launched priorities, goals and best practices to ensure the attack surface of ICS is defended from urgent threats and long-term risks. <\/p>\n<p>\u201cIt is important for consumers to note that the vulnerabilities disclosed today may seem like they have little impact, but critical infrastructure attacks do impact our daily lives. Cyber attacks such as <a href=\"https:\/\/www.computerweekly.com\/news\/252500508\/Colonial-Pipeline-ransomware-attack-has-grave-consequences\">the infamous Colonial Pipeline<\/a> serve as a reminder of this.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A series of eight newly designated common vulnerabilities and exposures (CVEs) in a building access control system built by HID Mercury and sold by Carrier \u2013 a global supplier of building systems for physical security, HVAC, and so on \u2013 could enable attackers to obtain full system control and remotely manipulate door locks, according to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":36638,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[533],"tags":[],"class_list":["post-36637","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it"],"_links":{"self":[{"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=\/wp\/v2\/posts\/36637","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=36637"}],"version-history":[{"count":0,"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=\/wp\/v2\/posts\/36637\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=\/wp\/v2\/media\/36638"}],"wp:attachment":[{"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=36637"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=36637"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=36637"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}