breach Archives | Vednam https://vednam.com/tag/breach/ Latest News on Cyber Security,Hacking and Tech Wed, 01 Jul 2020 08:10:03 +0000 en-US hourly 1 https://wordpress.org/?v=6.5.4 https://vednam.com/wp-content/uploads/2020/05/cropped-LOGO-PNG-02-1-32x32.png breach Archives | Vednam https://vednam.com/tag/breach/ 32 32 Hackers Control the Traffic Signals, Just like in Movies https://vednam.com/hackers-control-the-traffic-signal/ https://vednam.com/hackers-control-the-traffic-signal/#respond Tue, 09 Jun 2020 05:54:37 +0000 https://vednam.com/?p=824 SWARCO is developed to maintain the traffic light and the Data Security experts found Vulnerabilities during transmitting the signals. If the attackers know how to exploit the signals and if threat actors get access to the affected systems that may disrupt the operation of the linked transit devices. The same situation may be created in […]

The post Hackers Control the Traffic Signals, Just like in Movies appeared first on Vednam.

]]>
SWARCO is developed to maintain the traffic light and the Data Security experts found Vulnerabilities during transmitting the signals. If the attackers know how to exploit the signals and if threat actors get access to the affected systems that may disrupt the operation of the linked transit devices. The same situation may be created in the future as you all see the hackers are handling the traffic signals code.

The main issue or problem is that the open port used for system debugging grants the root user access to the device. There are no access controls with the network There is the change of exploitation is higher than that. From the vulnerable system administrators, it can remotely exploitable. The attack could be carried by malicious hackers and they don’t need advanced knowledge to execute the campaigns. 

According to the report of the data security “ The most critical Vulnerability was tracked as CVE-2020-12493 and the score received 10/10 according to the Common Vulnerability Scoring System (CVSS) remark the critical Issues.

If this potential attack could lead to catastrophic scenarios then it will create a big disaster because the German-based company which provides services for the transport control which has critical area infrastructure, some part of Europe also.

SWARCO TRAFFIC SYSTEM vulnerabilities found by the security team and start developing the security patch after receiving the report. The company product user can contact the security patch 

After the Updates are ready the cybersecurity expert contact with the team and send him the following steps to mitigate the risk of exploitation :

  1. Don’t minimize the network exposure for all the vulnerable control systems.
  2. Find the firewalls behind the network and remote device.
  3. Try to use Virtual Private Network) VPN If you remotely access the system regularly.

The Company has issued all the report on the Vulnerabilities once they consider the exploitation risk is completely resolved,

The post Hackers Control the Traffic Signals, Just like in Movies appeared first on Vednam.

]]>
https://vednam.com/hackers-control-the-traffic-signal/feed/ 0