<rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Vulnerabilities - Tag - Maritimeinfosec.org</title><link>https://maritimeinfosec.org/tags/vulnerabilities/</link><description>Vulnerabilities - Tag - Maritimeinfosec.org</description><generator>Hugo -- gohugo.io</generator><language>en-US</language><copyright>Copyright Maritimeinfosec.org 2018-2026</copyright><lastBuildDate>Tue, 30 Jun 2020 08:33:22 +0000</lastBuildDate><atom:link href="https://maritimeinfosec.org/tags/vulnerabilities/" rel="self" type="application/rss+xml"/><item><title>Autonomous maritime vehicles and cybersecurity risks</title><link>https://maritimeinfosec.org/autonomous-maritime-vehicles-and-cybersecurity-risks/</link><pubDate>Tue, 30 Jun 2020 08:33:22 +0000</pubDate><author>Olivier JACQ</author><guid>https://maritimeinfosec.org/autonomous-maritime-vehicles-and-cybersecurity-risks/</guid><description><![CDATA[<p>We have already discussed autonomous maritime vehicles in several previous articles, notably in the context of the first trials of autonomous ferries in Finland, in an article about the future of maritime information systems, and when reviewing some of the emerging regulatory references on the subject.</p>
<p>In the maritime domain, different categories of autonomous systems exist or are expected to emerge, including UAVs (<em>Unmanned Aerial Vehicles</em>), USVs (<em>Unmanned Surface Vehicles</em>), and UUVs (<em>Unmanned Underwater Vehicles</em>).</p>]]></description></item><item><title>Cyber risks associated with satellite positioning systems</title><link>https://maritimeinfosec.org/cyber-risks-associated-with-satellite-positioning/</link><pubDate>Mon, 20 Apr 2020 17:18:19 +0000</pubDate><author>Olivier JACQ</author><guid>https://maritimeinfosec.org/cyber-risks-associated-with-satellite-positioning/</guid><description><![CDATA[<h3 id="context">Context</h3>
<p>Today, the relatively low cost (a few tens of euros for a basic receiver), the miniaturization of hardware, and the widespread availability of GPS receivers have led many to assume that this global infrastructure will always be available. These advantages have also enabled the rapid expansion of GPS usage across many sectors where it was previously absent: healthcare, pet tracking, sports, agriculture, domestic robotics such as lawn mowers, photography, and even <a href="https://cranetechsolutions.com/GPS-guidance/" target="_blank" rel="noopener noreferrer ">port cranes</a> (see also <a href="http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.687.6757&amp;rep=rep1&amp;type=pdf" target="_blank" rel="noopener noreferrer ">this article</a>). As a result, it is now difficult to estimate how many GPS receivers are currently deployed worldwide.</p>]]></description></item><item><title>On the usefulness of penetration testing on ships</title><link>https://maritimeinfosec.org/the-usefulness-of-penetration-testing-on-ships/</link><pubDate>Fri, 18 Oct 2019 16:04:20 +0000</pubDate><author>Olivier JACQ</author><guid>https://maritimeinfosec.org/the-usefulness-of-penetration-testing-on-ships/</guid><description><![CDATA[<p>In an article published yesterday, the company Pen Test Partners, known for its blog posts on maritime cybersecurity, released <a href="https://www.pentestpartners.com/security-blog/unmasking-mystery-boxes-on-ships-bridges/" target="_blank" rel="noopener noreferrer ">a new, somewhat alarming article</a> on the topic.</p>
<p>Apparently, we are no longer supposed to adopt an alarming tone, so let us try to analyze it calmly.</p>
<p>The company, which operates in the United Kingdom and the United States, conducts penetration tests at the request of its clients on different types of ships. In their article, they explain that each time they perform such work, they manage to identify information systems that few — sometimes none — of the crew members know about, or whose purpose they do not understand. This may seem surprising. However, there can be explanations (which the article does not highlight, preferring — somewhat excessively in my view — the buzz). Here are a few possible explanations:</p>]]></description></item><item><title>Hack.lu 2018: how to hack a yacht</title><link>https://maritimeinfosec.org/how-to-hack-a-yacht-hack-lu-2018/</link><pubDate>Fri, 14 Dec 2018 13:38:41 +0000</pubDate><author>Olivier JACQ</author><guid>https://maritimeinfosec.org/how-to-hack-a-yacht-hack-lu-2018/</guid><description><![CDATA[<div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;">
      <iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen="allowfullscreen" loading="eager" referrerpolicy="strict-origin-when-cross-origin" src="https://www.youtube-nocookie.com/embed/_6MXtNMds3w?autoplay=0&amp;controls=1&amp;end=0&amp;loop=0&amp;mute=0&amp;start=0" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" title="YouTube video"></iframe>
    </div>

<p>This video was recorded during the well-known hack.lu 2018 conference in Luxembourg. In the first part, Stephan Gerling presents his view of maritime information systems and briefly discusses services such as GPS and AIS. He then focuses on ship-to-shore connectivity, particularly satellite communications.</p>
<p>He goes on to demonstrate design vulnerabilities in the control interface of a “naval” router. The management interface connects to the router via FTP, and the credentials and passwords are stored in clear text, making it easy to retrieve the WLAN credentials of the system.</p>]]></description></item><item><title>Derbycon 2018: Ship hacking — a primer for today's pirate</title><link>https://maritimeinfosec.org/ship-hacking-a-primer-for-todays-pirate/</link><pubDate>Thu, 25 Oct 2018 13:27:55 +0000</pubDate><author>Olivier JACQ</author><guid>https://maritimeinfosec.org/ship-hacking-a-primer-for-todays-pirate/</guid><description><![CDATA[<div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;">
      <iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen="allowfullscreen" loading="eager" referrerpolicy="strict-origin-when-cross-origin" src="https://www.youtube-nocookie.com/embed/bTOYHKB9IKM?autoplay=0&amp;controls=1&amp;end=0&amp;loop=0&amp;mute=0&amp;start=0" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" title="YouTube video"></iframe>
    </div>

<p>Presentation delivered during the Derbycon 2018 conference.</p>]]></description></item></channel></rss>