Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Power Security Technology

Researchers Discover Critical Security Flaws Found In Nuke Plant Radiation Monitors (securityweek.com) 43

wiredmikey writes from a report via Security Week: Researchers have discovered multiple unpatched vulnerabilities in radiation monitoring devices that could be leveraged by attackers to reduce personnel safety, delay detection of radiation leaks, or help international smuggling of radioactive material. Ruben Santamarta, a security consultant at Seattle-based IOActive, at the Black Hat conference on Wednesday, saying that radiation monitors supplied by Ludlum, Mirion and Digi contain multiple vulnerabilities. There are many kinds of radiation monitors used in many different environments. IOActive concentrated its research on portal monitors, used at airports and seaports; and area monitors, used at Nuclear Power Plants (NPPs). However, little effort was required for the portal monitors: "the initial analysis revealed a complete lack of security in these devices, so further testing wasn't necessary to identify significant vulnerabilities," Santamarta explained in his report (PDF). In the Ludlum Model 53 personnel portal, IOActive found a backdoor password, which could be used to bypass authentication and take control of the device, preventing the triggering of proper alarms.
This discussion has been archived. No new comments can be posted.

Researchers Discover Critical Security Flaws Found In Nuke Plant Radiation Monitors

Comments Filter:
  • by rtb61 ( 674572 ) on Thursday July 27, 2017 @10:58PM (#54896545) Homepage

    Automated radiation detection equipment that basically measures how big fines companies will pay when managing nuclear materials, back doors and no security, now that shit never happens by accident. Only question needed to be asked, how much money can be saved by not alerting the authorities of mismanagement, of letting them know investigations and prosecutions should occur and of opening up a cheating company taking stupid short cuts to civil suits. This device and the company need a proper investigation as does every single place that has that device fitted for undisclosed radiation leaks. This should be a major red flag.

  • Not at all suprising (Score:5, Informative)

    by ScienceBard ( 4995157 ) on Thursday July 27, 2017 @11:29PM (#54896625)

    I work alongside a team that maintains and repairs these things, and they certainly aren't made for high levels of digital security. If you know the right place to stick a flash drive in a portal monitor sure you could do damage to it, I can attest it isn't fancy. But it doesn't have to be.

    For one, a portal monitor is a last line of defense against radioactive contamination being tracked around. We aren't talking about huge levels of radiation, the contamination is managed by good safety practices (work plans, electronic dosimeters, maps of potential loose contamination, etc.). But there is a responsibility to ensure that a worker doesn't accidentally drag anything home with them to the general public, no matter how insignificant. Which is really what the monitors are for.

    For two, there are usually multiples of these things in a row, inside a heavily fortified concrete area surrounded by unfriendly looking men with machine guns (at least at any nuclear facility, a school or small lab that has one would be different). Combine those two things, and an attempt to "hack" monitors would be about the most moronic waste of resources any government would ever spend. You couldn't do any real damage, you couldn't hurt anyone... at best you could get a radiation protection manager fired for allowing a small uncontrolled release of radioactivity, or a miscalculated dose rate to a worker.

    I'm all for security, but there needs to be a little perspective. Standalone portal monitors that are airgaped don't need to be a digital fort knox. The level of effort is extreme to screw with them, and the payback would be insignificant. The truth is most specialized lab/nuclear equipment isn't extremely secure unless it serves an actual security function (a CDA, critical digital asset, which are almost always network isolated and have more robust security). Quite the opposite, most of it is very simple and made to be maintained almost indefinitely by moderately skilled technicians. Cost, usability, and maintainability is more important.

    • by Orgasmatron ( 8103 ) on Friday July 28, 2017 @12:09AM (#54896685)

      I have a drill coming up soon for my local reception center. I'll forward this to my EMS coordinator and make sure she updates the station briefing to include that the portals are never to be left unattended and that unauthorized personnel are not to mess with them. Not that anyone was going to leave them alone or let strangers tamper with them before...

      In the end, the most likely "patch" will be a locking cover.

      It remains unclear to me how one would hack a portal monitor to detect and respond to the check source, but not to actual contamination. The opposite would be easier, but we'd notice by the time a second clean body showed up for decontamination.

      The perimeter monitors are a much bigger problem. The men-with-guns are unlikely to allow physical tampering, and the men-in-tyvek will certainly notice that the detected radioactive cloud isn't real, but "no one will ever want to hack my industrial control communication" disease needs to die a horrible flaming death sooner rather than later. Digital sensors that do anything more than update a pretty graph need to be authenticated. In cases other than this one, they may need to be encrypted too. Analog sensors need 100% physical security from the power supply to the sensor to the receiver/monitor.

    • by arglebargle_xiv ( 2212710 ) on Friday July 28, 2017 @07:07AM (#54897467)

      Vaguely similar position, I've looked at the code running in some of these things. It's written by nuclear physicists who by the looks of the code are often self-taught programmers. It's not just a lack of security in there, it's a lack of any kind of sound programming practice. The physics part (meaning the algorithms and analysis portion) is just fine, but the code itself is ghastly, it's a wonder it works at all in some cases. If you move any part of it outside the parameters under which it was written, anything can happen, endless loops, processing invalid data, reading/writing arbitrary memory locations, you name it.

      It's known that these things have approximately zero security. They were accessed via VPN boxes that went back to a central, secure, location, and physical security around them was very, very heavy. If you know what you're dealing with, you can institute appropriate security measures to address it.

  • That was until I saw "Microsoft Windows" mentioned on page 10.
  • by Anonymous Coward
    We do not need to have every detector and monitor out there to be secure. That would detract to their strength namely monitoring, would add another point of failure namely that the security of those would need to be updated periodically. Why spend a lot of money which could be done better spent by having better detector ? No. The problem is if the monitor are left as-is naked to the internet. But so is also the problem with any devices for which the primary usage is industrial environment intranet and not
    • by TheOuterLinux ( 4778741 ) on Friday July 28, 2017 @12:47AM (#54896763) Homepage
      I don't think any medical device will be secure as we want them to be as long as they keep using Windows and Ethernet cables/Wifi for everything. Most offices in general don't even use USB cables for anything anymore, arguing that it is faster. Maybe, but when things break, now you got to hunt through a network to figure it out, risking breaking more things. Hope this posts; using w3m this time .
    • A nuclear plant... ocean-adjacent... on a tightly-pact island. WHAT COULD GO WRONG?!

      "Scientists suggest Fukushima was actually the best location of the listed alternatives, the alternative being located under a 10,000 baby day-care center for cancer survivors."

    • So, you are saying the decommissioning process is going well?

      I'm not sure what you think I'm supposed to take away from this. The is a discussion of nuclear power plant security and the Fukushima site seems pretty secure right now. They have no sign of uncontrolled release of radiation, and the exploratory robots are working well. I didn't look at all the photos in detail, is there a North Korean spy that was caught in one of the frames or something?

      • I'm not sure what you think I'm supposed to take away from this. The is a discussion of nuclear power plant security and the Fukushima site seems pretty secure right now. They have no sign of uncontrolled release of radiation,

        What? That is the exact opposite of what is happening. There is seawater exchange in and out of the location where they found the melted fuel. Remember when they were denying that there was even a meltdown? Evey time Tepco communicates, they lie. It's the most reliable force in the universe.

        • Evey time Tepco communicates, they lie. It's the most reliable force in the universe.

          So Kellyanne Conway is working for Tepco now?

      • by MrKaos ( 858439 )

        So, you are saying the decommissioning process is going well?

        No, I'm saying you attempt to falsify reality in pursuit of your idealogy.

        I'm saying TEPCO are clearly not capable, willfully and criminally negligent. I'm saying the sooner this is resolved with an international effort the lower the overall impact will be.

        They have no sign of uncontrolled release of radiation, and the exploratory robots are working well. I didn't look at all the photos in detail, is there a North Korean spy that was caught in

  • Those systems are largely air gapped in a physically secure environment. What I'd be more concerned about is that when I was working with the International Atomic Energy Authority (UN) about 4 years ago the entire outfit was still being run off an old IBM Series 360 Mainframe. I hadn't seen one of those since the mid 90's
    • What I'd be more concerned about is that when I was working with the International Atomic Energy Authority (UN) about 4 years ago the entire outfit was still being run off an old IBM Series 360 Mainframe.

      I don't know about the International Atomic Energy Authority, but the International Atomic Energy Agency isn't run off an IBM Series 360 Mainframe, or any kind of mainframe at all. Where was this "Authority" of yours located? A disused factory in Moldova?

      • Vienna
        • And where in the VIC is this magical IBM 360 located?

          (This should be good).

          • To be honest I don't know I never actually saw it. I was delivering training to a group of IAEA technicians & Devs who had been trying to migrate off this beast for years. The training had nothing to do with either the source or the target platform it was mostly theoretical (at the IAEA's request) on performance testing software solutions.
            • Yeah, sorry, guess I was being a bit harsh. There was an IBM mainframe that was commissioned some time in the 1970s to run the ubiquitous FORTRAN physics software, it replaced the CDC hardware they used before then, but it would have been relegated to dusty-deck status 15-20 years ago, if not longer. All the day-to-day stuff has been Wintel for years, with a bit of Linux on Intel in server rooms.
  • Am I wrong? Didn't they just recently raise the amount of "safe" radiation levels? The rise in bone cancer Sarcoma - is this a coincidence?

Top Ten Things Overheard At The ANSI C Draft Committee Meetings: (10) Sorry, but that's too useful.

Working...