Threat of the month: Compromised embedded systems
Embedded systems are small computing or logic devices that can connect to the internet. These are often deployed without network perimeter protection, such as a firewall. These devices are seldom patched, leaving them vulnerable to remote and local exploits.
How does it work?
The embedded systems are deployed with default configurations, so attackers can easily login and change critical systems, potentially causing real-world damage.
Should I be worried?
Embedded systems are usually treated with less security focus than workstations or servers, which is a huge mistake.
How can I prevent it?
I recommend placing devices behind network perimeter devices when possible. Default usernames and authentication credentials should also be changed. Another preventative measure is ensuring all embedded devices have up-to-date firmware/software.
From the - March 2012 Issue of SCMagazine »