NASA uncovered a network security flaw that could affect spacecraft
Spoofing attacks are going intergalactic, but NASA says risks are low
Researchers from the University of Michigan, University of Pennsylvania, and NASA have discovered a significant security flaw in networking technology used in spacecraft, airplanes, energy generation systems, and industrial control systems.
UoM's news portal Michigan News reported the flaw abuses a network protocol and hardware system known as time-triggered ethernet, or TTE.
This system allows mission-critical devices, such as life support systems, to coexist on the same network hardware as less important devices, such as passenger Wi-Fi, or data collection systems.
PCspooF
TTE was deemed safe for more than a decade, because the two types of network traffic were never allowed to interfere with one another on the same endpoint. It was originally established in a bid to reduce network costs while improving efficiency, the researchers said.
However, the researchers have now managed to crack this barrier with an attack dubbed PCspooF, discussing it extensively as part of a paper titled "PCspooF: Compromising the Safety of Time-Triggered Ethernet".
The team illustrated the flaw by using real NASA hardware to simulate an Asteroid Redirection Test, specifically the stage where a capsule must dock with a spacecraft.
As the capsule would try to dock, the attack mashed vital and non-vital communication together, disrupting messages going through the system and creating a cascading effect. Eventually, the capsule veered off course and missed the dock entirely.
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
Baris Kasikci, the Morris Wellman Faculty Development Assistant Professor of Computer Science and Engineering, laid the risks bare. “If someone executed this attack in a real spaceflight mission, what would the damage be?”
However, in order to successfully pull off a PCSpooF attack, the attacker needs to plant a small, malicious device on the network, which means remote attacks are not possible.
Other good news is that the flaw can be fixed, relatively easily, by replacing copper Ethernet with fiber optic cables, or installing optical isolators between switches and untrusted devices.
That would eliminate the risk of electromagnetic interference, although it would impact performance, according to researchers.
- Here's a round-up of the best firewalls today
Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.