U.S. Flag Official website of the Department of Homeland Security
U.S. Department of Homeland Security Seal. ICS-CERT. Industrial Control Systems Cyber Emergency Response Team.
TLP:WHITE

Advisory (ICSA-12-297-01)

Tropos Wireless Mesh Routers

Original release date: December 09, 2012 | Last revised: December 23, 2013

Legal Notice

All information products included in http://ics-cert.us-cert.gov are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see http://www.us-cert.gov/tlp/.



Overview

This advisory is a follow-up to the original advisory titled ICSA-12-297-01P—Tropos Wireless Mesh Routers Insufficient Entropy Vulnerability that was published October 23, 2012, on the ICS-CERT secure Portal library.

This advisory provides mitigation details for a vulnerability that impacts Tropos Wireless Mesh Routers. An independent research group composed of Nadia Heninger (University of California at San Diego), Zakir Durumeric (University of Michigan), Eric Wustrow (University of Michigan), and J. Alex Halderman (University of Michigan) identified an insufficient entropy vulnerabilitya in SSH key generation in Tropos Networks’s wireless network router product line. By impersonating the device, an attacker can obtain the credentials of administrative users and perform a Man-in-the-Middle (MitM) attack. Tropos has validated the vulnerability and produced an embedded operating software update that mitigates the reported vulnerability. According to Tropos, products are deployed across several sectors including the transportation, energy, water, emergency services, and critical manufacturing concentrated in the United States.

This vulnerability can be exploited remotely.

Affected Products

The following Tropos products are affected:

  • All wireless mesh routers running Mesh OS versions prior to release 7.9.1.1

Impact

An attacker can gain unauthorized access to the router by determining the authentication keys from reused or non-unique SSH host keys. By exploiting this vulnerability, the attacker can perform a MitM attack to affect the integrity of the data on the system.

Impact to individual organizations depends on many factors that are unique to each organization. ICS-CERT recommends that organizations evaluate the impact of this vulnerability based on their operational environment, architecture, and product implementation.

Background

Tropos Networks is a US-based company. Tropos wireless mesh routers are used to build large scale, communication networks for aggregating multiple smart grids, industrial controllers, and fixed and mobile communication applications. According to Tropos, products are deployed across several sectors including the transportation, energy, water, emergency services, and critical manufacturing sectors. Tropos estimates that these products are used primarily in the United States (79% product deployment) and over 50 additional countries (21% total).

Vulnerability Characterization

Vulnerability Overview

Insufficient Entropyb

The Tropos products do not use sufficient entropy when generating keys for SSH connections, thereby making them weak. By calculating private authentication keys, an attacker could perform a MitM attack on the system by knowing the non-unique host key. This could enable the attacker to gain unauthorized access to the system and read information on the device, as well as inject data into the SSH stream compromising the integrity of the data.

CVE-2012-4898 has been assigned to this vulnerability. A CVSS v2 base score of 6.1 has been assigned; the CVSS vector string is (AV:N/AC:H/Au:N/C:C/I:P/A:N).

Vulnerability Details

Exploitability

This vulnerability can be exploited remotely.

Existence of Exploit

No known public exploits specifically target this vulnerability.

Difficulty

An attacker with a high skill would be able to exploit this vulnerability.

Mitigation

Tropos Networks has released customer notification and an update (Tropos Mesh OS 7.9.1.1) for its network device embedded software. This update can be downloaded from the Tropos software download page. Download of the update requires a valid user name and password. The updated firmware fixes the vulnerability by using sufficient entropy to generate unique SSH host keys.

ICS-CERT encourages asset owners to take additional defensive measures to protect against this and other cybersecurity risks.

  • Minimize network exposure for all control system devices. Critical devices should not directly face the Internet.
  • Locate control system networks and remote devices behind firewalls, and isolate them from the business network.
  • When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing that VPN is only as secure as the connected devices.

ICS-CERT also provides a section for control systems security recommended practices on the US-CERT Web page. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies. ICS-CERT reminds organizations to perform proper impact analysis and risk assessment prior to taking defensive measures.


Contact Information

For any questions related to this report, please contact the NCCIC at:

Email: NCCICCUSTOMERSERVICE@hq.dhs.gov
Toll Free: 1-888-282-0870

For industrial control systems cybersecurity information:  http://ics-cert.us-cert.gov 
or incident reporting:  https://ics-cert.us-cert.gov/Report-Incident?

The NCCIC continuously strives to improve its products and services. You can help by choosing one of the links below to provide feedback about this product.

Was this document helpful?  Yes  |  Somewhat  |  No

Back to Top