Sensys Fixes Traffic Sensor Holes

Friday, September 5, 2014 @ 06:09 PM gHale

Sensys Networks created updated product versions that mitigate vulnerabilities in their VSN240-F and VSN240-T traffic sensors, according to a report on ICS-CERT.

The Sensys Networks traffic sensors, VSN240-F and VSN240-T, operating with the following software versions suffer from the issue:
Versions prior to VDS 2.10.1,
Versions prior to VDS 1.8.8, and
Versions prior to TrafficDOT 2.10.3

Schneider Fixes Wonderware Holes
CG Automation Fixes Improper Input Validation
Siemens Fixes SIMATIC S7-1500 CPU Hole
Siemens Updates OpenSSL Holes

Researcher Cesar Cerrudo of IOActive discovered the vulnerabilities.

Insufficient integrity checking by the traffic sensors may enable the installation of modified software that could damage the traffic sensors. A traffic sensor rendered inoperable may cause the traffic system to default to a failsafe condition, prompting traffic lights of an intersection to operate on predetermined timed intervals. Only the traffic lights linked to compromised sensors may suffer from the issue.

Unencrypted communication between the traffic sensor and the access point could end up modified and used to cause traffic collection data inaccuracies, which may have limited impact on traffic control for an intersection. Inaccurate collection of traffic data may yield limited influence over traffic light timing for an intersection.

Sensys Networks is a U.S.-based company that supplies wireless traffic detection and integrated traffic data systems.

The affected products, Sensys Networks VSN240-F and VSN240-T traffic sensors, are wireless vehicle detection sensors. Sensys Networks said these products see action primarily in the United States and in multiple countries around the world.

The traffic sensors accept software modifications without sufficiently checking the integrity of the new code, leaving the devices vulnerable to modification and damage.

CVE-2014-2378 is the case number assigned to this vulnerability, which has a CVSS v2 base score of 6.5.

Unencrypted wireless traffic between a traffic sensor and an access point could end up intercepted and replayed to influence traffic data, which could have a limited impact on traffic control for an intersection.

CVE-2014-2379 is the case number assigned to this vulnerability, which has a CVSS v2 base score of 4.3.

These vulnerabilities could end up exploited from an adjacent network. No known public exploits specifically target these vulnerabilities and an attacker with a high skill would be able to exploit these vulnerabilities.

Sensys Networks has produced updated product versions VDS 2.10.1 and TrafficDOT 2.10.3 to remediate vulnerabilities identified in their VSN240-F and VSN240-T traffic sensors.

Sensys Networks also released software update VDS 1.8.8, for an older model access point, to remediate traffic sensor vulnerabilities. The updated human-machine interface version, TrafficDOT 2.10.3, enables encrypted software downloads for sensors and sensor data authentication for access points and access point controller cards using updated versions VDS 2.10.1 or VDS 1.8.8.

Click here for additional information about Sensys Networks’ product releases.

Updated product versions are available through Sensys Networks’ local distributors. Click here for contact information for their local distributors.

Leave a Reply

You must be logged in to post a comment.