remote to port 80
parent
b26481c32f
commit
0556b36b59
|
@ -85,9 +85,6 @@ some as old as 2013.
|
|||
# Hypothetical Scenarios
|
||||
Nature of attacks, once exploited.
|
||||
|
||||
The devices query remote servers on port `80` in cleartext. This can be
|
||||
easily hijacked and fed false data.
|
||||
|
||||
* Device can be fed bogus data. For example, hack a competitor's device to
|
||||
say there's no gold when there is gold. Nefarious company could EPA's device
|
||||
when they come inspect contaminated land, and make the device's readings
|
||||
|
@ -113,6 +110,9 @@ xray or laser power beyond default limits.
|
|||
|
||||
* All devices have the same static IP hardcoded in binary.
|
||||
|
||||
* The devices query remote servers on port `80` in cleartext. This can be
|
||||
easily hijacked and fed false data.
|
||||
|
||||
|
||||
# CVE
|
||||
The system is running kernel `3.10.49` which has a vast list of known
|
||||
|
|
Loading…
Reference in New Issue