Security

Hunt for Red Bugtober: US military's weapon systems riddled with security holes – auditors

Death from a-bug. Dr Strange-bug. Top Bug. We could do this all day...


Computer security vulnerabilities are widespread in US military hardware, and the Pentagon is only beginning to understand how to fix them.

This is according to a October report [PDF] on cybersecurity practices in Uncle Sam's armed forces, drawn up by the Government Accountability Office (GAO).

Leading with the subtle title "DOD Just Beginning to Grapple with Scale of Vulnerabilities," the dossier outlines how known exploitable flaws in components like micro-controllers, industrial control system boards, and management software, are being left un-patched with little in the way of plans to address them. That's bad news as more and more stuff is hooked up to computer networks and the internet, from where holes can be potentially exploited.

"Although GAO and others have warned of cyber risks for decades, until recently, DOD did not prioritize weapon systems cybersecurity. Finally, DOD is still determining how best to address weapon systems cybersecurity," the scathing report stated.

"In operational testing, DOD routinely found mission-critical cyber vulnerabilities in systems that were under development, yet program officials GAO met with believed their systems were secure and discounted some test results as unrealistic."

Uncle Sam to strap body sensors to hackers in nuke lab security study

READ MORE

According to the auditors, the problem lies both in the structure of the Department of Defense itself – where network and information security is kept separate from weapons systems and acquisitions – and in the way the weapons are increasingly relying on network connectivity and smart connectivity to function.

As a result, the report claims the department is only beginning to figure out what it needs to patch and how it needs to go about doing it in things like missile guidance systems or fighter jets. Even new systems, the GAO said, are being introduced with major vulnerabilities and exposures like default passwords and unencrypted data connections.

"In part because DOD historically focused on the cybersecurity of its networks but not weapon systems themselves, DOD is in the early stage of trying to understand how to apply cybersecurity to weapon systems," the report stated.

"Several DOD officials explained that it will take some time, and possibly some missteps, for the department to learn what works and does not work with respect to weapon systems cybersecurity."

Here are some other choice highlights from the report:

Legacy software is going to get someone killed

Even if Uncle Sam's techies are savvy enough to use strong passwords, patch software, and implement the other key “don't be stupid” features to secure the military's latest systems, the auditors claimed nearly every new piece of kit will be potentially vulnerable to attack anyway, because it has to be connected to an older and insecure system.

Their report stated there's probably “an entire generation of systems” with inadequate security, and “if DoD is able to make its newer systems more secure, but connects them to older systems, this puts the newer systems at risk.”

Some systems can't even be tested properly: one system uses proprietary black-box hardware and software and depended on a connection back to a contractor's corporate network, which was off-limits to security testers.

On the bright side, the auditors said the military has, since 2014, issued or updated “at least 15 department-wide policies, guidance documents, and memorandums intended to promote more cyber secure weapon systems,” and its existing infosec policies now “explicitly apply to weapons systems." So that's all right, then.

In the meantime, the auditors said the Pentagon should continue focusing on upping its efforts to develop cybersecurity offices (read: recruit more techies) and find ways to better coordinate communications between departments so they can share vulnerability and threat information with one another. ®

Send us news
18 Comments

Microsoft is opening Windows Update to third-party apps

Also in preview: a settings backup feature to support OS upgrades

Go ahead and ignore Patch Tuesday – it might improve your security

No rush, according to Gartner chap who says: 'Nobody has ever out-patched threat actors at scale'

Microsoft pitches pay-to-patch reboot reduction subscription for Windows Server 2025

Redmond reckons $1.50/core/month hotpatch service is worth it to avoid eight Patch Tuesday scrambles each year

Microsoft rated this bug as low exploitability. Miscreants weaponized it in just 8 days

It's now hitting govt, enterprise targets

Windows Server Update Services live to patch another day

Disconnected device scenarios cause headaches for Microsoft

Oracle Health reportedly warns of info leak from legacy server

PLUS: OpenAI bumps bug bounties bigtime; INTERPOL arrests 300 alleged cyber-scammers; And more!

25 years on from Y2K, let's all be glad it happened way back then

With today’s connected tech, a similar-scale bug would be hard to squash

Micropatchers share 1-instruction fix for NTLM hash leak flaw in Windows 7+

Microsoft's OS sure loves throwing your creds at remote systems

Patch management still seemingly abysmal because no one wants the job

Are your security and ops teams fighting to pass the buck?

Hello? Are you talking on a Cisco SPA300 or SPA500 IP phone? Now's the time to junk 'em

Multiple critical flaws found and they won't be fixed

Your victim's Windows PC fully patched? Just force undo its updates and exploit away

This guy showed the world how – with the right level of access

Apple squashes security bugs after iPhone flaws exploited by Predator spyware

Holes in iOS, macOS and more fixed following tip off from Google, Citizen Lab