CH 9
CH 9
Chapter 9
Embedded Operating Systems: The Hidden
Threat
• VxWorks
– Widely used embedded OS
• Developed by Wind River Systems
– Used in many different environments and
applications
– Designed to run efficiently on minimal hardware
– Used by a variety of systems
Figure 9-3 Creating an embedded OS image in VxWorks Workbench
Other Proprietary Embedded OSs
(cont’d.)
• Green Hill Software embedded OSs
– F-35 Joint Strike Fighter
– Multiple independent levels of security/safety (MILS)
• OS certified to run multiple levels of classification
– Embedded OS code
• Used in printers, routers, switches, etc.
• QNX Software Systems QNX
– Commercial RTOS
• Used in Cisco’s ultra-high-availability routers and
Logitech universal remotes
Other Proprietary Embedded OSs
(cont’d.)
• Real-Time Executive for Multiprocessor Systems
(RTEMS)
– Open-source embedded OS
– Used in space systems
• Supports processors designed to operate in space
• Using multiple embedded OSs
– Increases attack surface
*Nix Embedded OSs
• Embedded Linux
– Monolithic OS
• Used in industrial, medical, and consumer items
– Can be tailored for devices with limited memory or
hard drive capacity
– Supports widest variety of hardware
– Allows adding features
• Dynamic kernel modules
*Nix Embedded OSs (cont’d.)
• Links Ch 9e, 9f
Windows Mobile Vulnerabilities
Vulnerabilities of Embedded OS's
• Link Ch 9g
Embedded OSs Are in Networking
Devices
• Networking devices
– Usually have software and hardware designed to
transmit information across networks
• General-purpose computers
– Originally performed routing and switching
• High-speed networks now use specialized hardware
and embedded OSs
• Attacks that compromise a router
– Can give complete access to network resources
• Attackers follow usual methods of footprinting,
scanning, and enumerating the target
Embedded OSs Are in Networking
Devices (cont’d.)
• Authentication bypass vulnerability
– Common vulnerability of routers
– Specially crafted URL bypasses normal
authentication mechanism
• Router Hacking Contest
– Link Ch 8h
• After bypassing authentication
– Attackers can launch other network attacks
• Use access gained through compromised router
• "...if your browser’s user agent string is
“xmlset_roodkcableoj28840ybtide” (no
quotes), you can access the web
interface without any authentication and
view/change the device settings..."
• Link Ch 9s
Embedded OSs Are in Network
Peripherals
• Common peripheral devices:
– Printers, scanners, copiers, and fax devices
• Multifunction devices (MFDs)
– Perform more than one function
• Rarely scanned for vulnerabilities or configured for
security
– Have embedded OSs with sensitive information
• Information susceptible to theft and modification
• Attackers may use malware or insert malicious links
• Social-engineering techniques may be used to gain
access
Hacking into a Printer
Not in book
SCADA Vulnerabilities
∗ Link Ch 9q
81 Vulnerable DRAC systems
∗ Using
SHODAN
∗ Link
Ch 9r
46
Even Worse
47
DHS Response
48
Cell Phones, Smartphones, and PDAs
• Link Ch 9l
Rootkits
• Link Ch 9o
Best Practices for Protecting Embedded OSs
Best Practices for Protecting
Embedded OSs
• Include:
– Identify all embedded systems in an organization
• Prioritize systems or functions that depend on them
– Follow least privileges principle for access
– Use data transport encryption
– Configure embedded systems securely
• Use cryptographic measures
• Install patches and updates
• Restrict network access and reduce attack surface
• Upgrade or replace systems that can’t be fixed or pose
unacceptable risks