Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Tuesday, 28 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

These 10 IoT devices pose the biggest risk to your organisation

Cyber defences are only ever as effective as their weakest link

by Richard Orange
August 25, 2020
in Insight
These 10 IoT devices pose the biggest risk to your organisation
Share on FacebookShare on Twitter

 

By Richard Orange, Regional Director of UK&I at Forescout

Connected devices continue to transform the way organisations operate in every industry. From healthcare and retail to manufacturing and financial services, Internet of Things (IoT) devices are omnipresent and positively impact the bottom line of many organisations. But an increase in connected devices also means an increase in the potential attack surface for bad actors who are constantly on the lookout for vulnerabilities to exploit.

This threat is very real. Almost half of UK businesses reported a cyber security breach or attack between March 2019 and March 2020, the Department for Digital, Culture, Media & Sport has revealed. Organisations often focus their cyber security efforts on protecting well-known connected devices like laptops, mobile devices or tablets. But cyber defences are only ever as effective as their weakest link and all it takes is for one connected device to be compromised in order for bad actors to wreak havoc. The danger is particularly big around OT devices that are still running old operating systems, that are often not properly monitored and that were never intended to be connected to a network in the first place.

Some devices are much more susceptible to attacks than others. So, after analysing over 8 million connected devices, here are the 10 types of IoT devices that pose the biggest cyber security risk to organisations today:

  1. Physical Access Control Solutions

These devices are used to open or close door locks in the presence of authorised badges. In our research, they were often found configured with open ports (including Telnet port 23), connected to other risky devices and containing serious reported vulnerabilities.

  1. HVAC Systems

These devices were also found configured with critical open ports (including Telnet), connected to other risky devices and containing a couple of critical vulnerabilities that allow a complete takeover of a device (CVE-2015-2867 and CVE-2015-2868).

  1. Network Cameras

These IP cameras have dozens of serious vulnerabilities associated with them (e.g., CVE-2018-10660), they are usually configured with critical ports such as SSH port 22 and FTP port 21 enabled, and they are connected to risky devices.

  1. PLC

The PLCs identified have serious vulnerabilities associated with them (e.g., CVE-2018-16561) and their potential impact is very high, since PLCs control critical industrial processes. (The infamous Stuxnet malware, for instance, targeted S7 systems used for uranium enrichment.) Still, these devices are ranked lower than the first three since, in our sample, they have fewer ports open and reduced connectivity.

  1. Radiotherapy Systems

There are no vulnerabilities reported for these devices, but they were found configured with many critical ports open (including Telnet) and connectivity to other risky medical devices. The impact of exploitation of these devices is inherently high.

  1. Out-of-Band Controllers

This refers to an out-of-band controller for servers that are integrated into the main board, which provides an interface to manage and monitor server hardware. It contains its own processor, memory, network connection and access to the system bus. Relevant vulnerabilities have been found in these devices, such as CVE 2015-7272, which can be exploited via SSH (port 22 was open in all of these devices found in our dataset) to achieve a denial-of-service attack and CVE-2019-13131, which can be exploited via SNMP (port 161 was open in most iDRAC devices found in our dataset) to achieve remote code execution.

  1. Radiology Workstations

This workstation is commonly connected to many peripheral systems in healthcare delivery organisations, such as Radiology Information Systems, PACS, Electronic Health Records systems and so on. As in the case of radiotherapy systems, there are no reported vulnerabilities. However, these devices were found configured with many critical ports open and connectivity to risky devices. The exploitation impact is also very high since it is a workstation where common attacker tools can be easily adapted to achieve persistence or to pivot within a healthcare network.

  1. Picture Archiving and Communication Systems (PACS)

PACS are medical imaging systems that provide storage, retrieval, management, distribution and presentation of medical images. Our research found vulnerabilities associated with these systems (e.g., CVE-2017-14008 and CVE-2018-14789). They have a similar risk profile to other medical devices in our research sample due to their place in the network and their use context.

  1. Wireless Access Points

These contain many critical vulnerabilities, including CVE-2017-3831 and CVE-2019-15261, and are often connected to multiple risky guest devices.

  1. Network Management Cards

These cards are used to remotely monitor and control individual UPS devices. Besides the presence of known vulnerabilities (e.g., CVE-2018-7820), high connectivity and open ports, these devices have the interesting capability of supporting the BACnet/IP and Modbus/TCP protocols, which again highlights the convergence of smart building technology with IT infrastructure.

What is abundantly clear from this list is that these devices are typically unmanaged. Only if organisations achieve full visibility and control of all the devices connected to their networks can they adequately address and manage these vulnerabilities. On top of that, network segmentation offers an additional layer of protection, limiting the access devices have and preventing bad actors from moving laterally within a network in case of a breach. With these solutions in place, organisations will be able to reduce the risk of cyber attacks and, importantly, continue to reap the full benefits IoT devices have to offer.

 

FacebookTweetLinkedIn
Share2TweetShare
Previous Post

70% of large businesses consider remote working a security hazards: The experts have their say

Next Post

US and Australian government warn of critical vulnerabilities in Cisco, Microsoft and IBM remote access and perimeter devices

Recent News

Blue Logo OUTPOST24

New Research Examines Traffers and the Business of Stolen Credentials

March 28, 2023

How to Succeed As a New Chief Information Security Officer (CISO)

March 28, 2023

The Importance of Data Security and Privacy for Individuals and Businesses in the Digital Age

March 28, 2023
penetration testing

Cymulate’s 2022 Cybersecurity Effectiveness Report reveals that organizations are leaving common attack paths exposed

March 28, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information