Tropos Wireless Mesh Routers
All information products included in http://ics-cert.us-cert.gov are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see http://www.us-cert.gov/tlp/.
This advisory is a follow-up to the original advisory titled ICSA-12-297-01P—Tropos Wireless Mesh Routers Insufficient Entropy Vulnerability that was published October 23, 2012, on the ICS-CERT secure Portal library.
This advisory provides mitigation details for a vulnerability that impacts Tropos Wireless Mesh Routers. An independent research group composed of Nadia Heninger (University of California at San Diego), Zakir Durumeric (University of Michigan), Eric Wustrow (University of Michigan), and J. Alex Halderman (University of Michigan) identified an insufficient entropy vulnerabilitya in SSH key generation in Tropos Networks’s wireless network router product line. By impersonating the device, an attacker can obtain the credentials of administrative users and perform a Man-in-the-Middle (MitM) attack. Tropos has validated the vulnerability and produced an embedded operating software update that mitigates the reported vulnerability. According to Tropos, products are deployed across several sectors including the transportation, energy, water, emergency services, and critical manufacturing concentrated in the United States.
This vulnerability can be exploited remotely.
The following Tropos products are affected:
- All wireless mesh routers running Mesh OS versions prior to release 184.108.40.206
An attacker can gain unauthorized access to the router by determining the authentication keys from reused or non-unique SSH host keys. By exploiting this vulnerability, the attacker can perform a MitM attack to affect the integrity of the data on the system.
Impact to individual organizations depends on many factors that are unique to each organization. ICS-CERT recommends that organizations evaluate the impact of this vulnerability based on their operational environment, architecture, and product implementation.
Tropos Networks is a US-based company. Tropos wireless mesh routers are used to build large scale, communication networks for aggregating multiple smart grids, industrial controllers, and fixed and mobile communication applications. According to Tropos, products are deployed across several sectors including the transportation, energy, water, emergency services, and critical manufacturing sectors. Tropos estimates that these products are used primarily in the United States (79% product deployment) and over 50 additional countries (21% total).
The Tropos products do not use sufficient entropy when generating keys for SSH connections, thereby making them weak. By calculating private authentication keys, an attacker could perform a MitM attack on the system by knowing the non-unique host key. This could enable the attacker to gain unauthorized access to the system and read information on the device, as well as inject data into the SSH stream compromising the integrity of the data.
This vulnerability can be exploited remotely.
Existence of Exploit
No known public exploits specifically target this vulnerability.
An attacker with a high skill would be able to exploit this vulnerability.
Tropos Networks has released customer notification and an update (Tropos Mesh OS 220.127.116.11) for its network device embedded software. This update can be downloaded from the Tropos software download page. Download of the update requires a valid user name and password. The updated firmware fixes the vulnerability by using sufficient entropy to generate unique SSH host keys.
ICS-CERT encourages asset owners to take additional defensive measures to protect against this and other cybersecurity risks.
- Minimize network exposure for all control system devices. Critical devices should not directly face the Internet.
- Locate control system networks and remote devices behind firewalls, and isolate them from the business network.
- When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing that VPN is only as secure as the connected devices.
ICS-CERT also provides a section for control systems security recommended practices on the US-CERT Web page. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies. ICS-CERT reminds organizations to perform proper impact analysis and risk assessment prior to taking defensive measures.
For any questions related to this report, please contact the NCCIC at:
Toll Free: 1-888-282-0870
The NCCIC continuously strives to improve its products and services. You can help by choosing one of the links below to provide feedback about this product.