This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Top 10 2014-I9 Insecure Software/Firmware"
From OWASP
Craig Smith (talk | contribs) |
|||
(11 intermediate revisions by one other user not shown) | |||
Line 1: | Line 1: | ||
− | <center>[https://www.owasp.org/index.php/ | + | <center>[https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=Top_10_IoT_Vulnerabilities__282014_29 Back To The Internet of Things Top 10]</center> |
{{Top_10_2010:SummaryTableHeaderBeginTemplate|year=2013|language=en}} | {{Top_10_2010:SummaryTableHeaderBeginTemplate|year=2013|language=en}} | ||
{{Top_10:SummaryTableTemplate|exploitability=3|prevalence=2|detectability=1|impact=1|year=2013|language=en}} | {{Top_10:SummaryTableTemplate|exploitability=3|prevalence=2|detectability=1|impact=1|year=2013|language=en}} | ||
{{Top_10_2010:SummaryTableHeaderEndTemplate|year=2013}} | {{Top_10_2010:SummaryTableHeaderEndTemplate|year=2013}} | ||
− | <td {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2013}}>Consider anyone who has access to the device and/or the network the device resides on. | + | <td {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2013}}>Consider anyone who has access to the device and/or the network the device resides on. Also consider anyone who could gain access to the update server. |
</td> | </td> | ||
Line 10: | Line 10: | ||
</td> | </td> | ||
− | <td colspan=2 {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2013}}> | + | <td colspan=2 {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2013}}>The lack of ability for a device to be updated presents a security weakness on its own. Devices should have the ability to be updated when vulnerabilities are discovered and software/firmware updates can be insecure when the updated files themselves and the network connection they are delivered on are not protected. Software/Firmware can also be insecure if they contain hardcoded sensitive data such as credentials. Security issues with software/firmware are relatively easy to discover by simply inspecting the network traffic during the update to check for encryption or using a hex editor to inspect the update file itself for interesting information. |
</td> | </td> | ||
Line 23: | Line 23: | ||
{{Top_10:SubsectionTableBeginTemplate|type=main}} {{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=freetext|title=Is My Software/Firmware Secure?|position=firstLeft|year=2013|language=en}} | {{Top_10:SubsectionTableBeginTemplate|type=main}} {{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=freetext|title=Is My Software/Firmware Secure?|position=firstLeft|year=2013|language=en}} | ||
* Note - It is very important that devices first and foremost have the ability to update and perform updates regularly. | * Note - It is very important that devices first and foremost have the ability to update and perform updates regularly. | ||
− | + | Checking for insecure software/firmware updates include: | |
+ | * Reviewing the update file itself for exposure of sensitive information in human readable format by someone using a hex edit tool | ||
+ | * Reviewing the production file update for proper encryption using accepted algorithms | ||
+ | * Reviewing the production file update to ensure it is properly signed | ||
+ | * Reviewing the communication method used to transmit the update | ||
+ | * Reviewing the cloud update server to ensure transport encryption methods are up to date and properly configured and that the server itself is not vulnerable | ||
+ | * Reviewing the device for proper validation of signed update files | ||
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=freetext|title=How Do I Secure My Software/Firmware?|position=right|year=2013|language=en}} | {{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=freetext|title=How Do I Secure My Software/Firmware?|position=right|year=2013|language=en}} | ||
Securing software/firmware require: | Securing software/firmware require: | ||
− | # | + | # Ensuring the device has the ability to update (very important, need secure update mechanism) |
− | # Ensuring the update file is encrypted using accepted encryption methods | + | # Ensuring the update file is encrypted using accepted encryption methods |
− | # Ensuring the update file is transmitted via an encrypted connection | + | # Ensuring the update file is transmitted via an encrypted connection |
− | # Ensuring the update file does not | + | # Ensuring the update file does not expose sensitive data |
− | # Ensuring the update is signed and verified before allowing the update to be uploaded and applied. | + | # Ensuring the update is signed and verified before allowing the update to be uploaded and applied |
+ | # Ensuring the update server is secure | ||
+ | # Implement the secure boot if possible (chain of trust) | ||
+ | |||
+ | Please review the following tabs for more detail based on whether you are a [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Top_Ten_Project#tab=Manufacturers Manufacturer], [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Top_Ten_Project#tab=Developers Developer] or [https://www.owasp.org/index.php/OWASP_Internet_of_Things_Top_Ten_Project#tab=Consumers Consumer] | ||
+ | |||
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=example|position=left|risk=1|year=2013|language=en}} | {{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=example|position=left|risk=1|year=2013|language=en}} | ||
'''Scenario #1:''' Update file is transmitted via HTTP. | '''Scenario #1:''' Update file is transmitted via HTTP. |
Latest revision as of 06:57, 5 February 2016
Threat Agents | Attack Vectors | Security Weakness | Technical Impacts | Business Impacts | |
---|---|---|---|---|---|
Application Specific | Exploitability DIFFICULT |
Prevalence COMMON |
Detectability EASY |
Impact SEVERE |
Application / Business Specific |
Consider anyone who has access to the device and/or the network the device resides on. Also consider anyone who could gain access to the update server. | Attacker uses multiple vectors such as capturing update files via unencrypted connections, the update file itself is not encrypted or they are able to perform their own malicious update via DNS hijacking. Depending on method of update and device configuration, attack could come from the local network or the internet. | The lack of ability for a device to be updated presents a security weakness on its own. Devices should have the ability to be updated when vulnerabilities are discovered and software/firmware updates can be insecure when the updated files themselves and the network connection they are delivered on are not protected. Software/Firmware can also be insecure if they contain hardcoded sensitive data such as credentials. Security issues with software/firmware are relatively easy to discover by simply inspecting the network traffic during the update to check for encryption or using a hex editor to inspect the update file itself for interesting information. | Insecure software/firmware could lead to compromise of user data, control over the device and attacks against other devices. | Consider the business impact if data can be stolen or modified and devices taken control of for the purpose of attacking other devices. Could your customers be harmed? Could other users be harmed? |
Is My Software/Firmware Secure?
Checking for insecure software/firmware updates include:
|
How Do I Secure My Software/Firmware?
Securing software/firmware require:
Please review the following tabs for more detail based on whether you are a Manufacturer, Developer or Consumer |
Example Attack Scenarios
Scenario #1: Update file is transmitted via HTTP. http://www.xyz.com/update.bin Scenario #2: Update file is unencrypted and human readable data can be viewed. �v�ñ]��Ü��Qw�û]��ˇ3DP�Ö�∂]��ˇ3DPadmin.htmadvanced.htmalarms.htm In the cases above, the attacker is able to either capture the update file or capture the file and view it's contents.
|
References
OWASP External |