Page 236 - Kaleidoscope Academic Conference Proceedings 2024
P. 236

2024 ITU Kaleidoscope Academic Conference




                     Table 3 – Search results in Shodan for network devices related to the use case of solar power plant

                   Product   Shodan (a)  CVEs (b)                  Overview of CVE
                                             - Certificate and password management vulnerabilities.
                                             - Cross-site scripting (XSS) vulnerability in the diagnostic ping function
                                             of the switch’s management web interface.
                   Switch      4       4     - GoAhead web server on the switch can cause a remote authenticated user
                                             to cause a denial of service (reboot) via a crafted URL.
                                             - The switch’s admin web interface allows remote authenticated users to bypass
                                             the read-only protection mechanism using Firefox with a web developer plugin.
                                             - Vulnerability to execution with unnecessary privileges could allow an attacker
                   Gateway     13      1
                                             with user-level privileges to gain root privileges.
                                             - Users are restricted to using short pass.
                                             - Passwords are transmitted in a format that is not sufficiently secure.
                                             - The web application does not sanitize input, enabling script injection or
                 Remote I/O    9       4
                                             code execution by attackers.
                                             - Web applications may not adequately verify that the request was provided by a
                                             valid user (CROSS-SITE REQUEST FORGERY).
                  (a)  Number of devices hit by Shodan.
                  (b)  Number of CVEs related to products in (a).


           targeted for investigation and examined for vulnerabilities        6.  DISCUSSION
           using the National Vulnerability Database (NVD) [20]. The
           results are listed in Table 3. The NVD database includes  In this section, we discuss the potential risks described in
           includes a description of each vulnerability, the products and  Section 5. First, in Section 6.1, we discuss standards that
           versions that are affected, and the severity of the vulnerability.  can provide countermeasures against these potential risks.
           In addition, NVD uniquely identifies each vulnerability using  Next, in Section 6.2, we summarize three issues that need
           a set of identifiers known as Common Vulnerabilities and  to be resolved in the future as open issues and provide
           Exposures (CVE). The CVE numbers are omitted to prevent  recommendations on how to overcome these issues.
           the identification of the target products. A total of 18 CVEs
           were identified in Company A’s switches, with four directly  6.1 Current standards as potential countermeasures
           linked to the products identified by Shodan. These included
           vulnerabilities in the certificate and password management  In this section, we present standards that can provide
           across multiple products and a cross-site scripting flaw in  countermeasures against threats that may emerge in the
           the switch’s diagnostic ping function. Company A’s gateway  future, as described previously. Most of the standards are
           also had one CVE, highlighting a privilege escalation risk.  for embedded devices in general, including IoT devices,
           Furthermore, 13 CVEs were discovered in Company A’s  and few standards target specific applications such as
           remote I/O, four aligning with the products flagged by the  agriculture.  However, as shown in Section 5, most of
           initial Shodan search. These vulnerabilities ranged from  the currently confirmed infection cases are general-purpose
           limitations on password length to insecure transmission  network devices and Web GUI management systems, and
           methods and flaws in user input sanitization and request  threats that may emerge in the future are not likely to
           verification within web applications. Various vulnerabilities  be devices specific to agricultural applications. Therefore,
           were found in the network devices used in this solar power  this section discusses the standardization of IoT devices in
           plant example. While they are different fields, the identified  general.
           vulnerabilities may become potential cybersecurity risks in  Regarding legal frameworks for IoT device security, there are
           agriculture.                                       "The IoT Cybersecurity Improvement Act [21]" and "SB-327
                                                              Information privacy: connected devices [22]" in the United
                                                              States, "Cybersecurity Act [23]" and "EU Cyber Resilience
           5.3  WebGUI vulnerabilities found in Shodan
                                                              Act [24]" in the European Union, and the "Product Security
                                                              and Telecommunications Infrastructure Act 2022 [25]" in
           Figure 6 shows the cases where we could access websites  the United Kingdom, etc. In addition, as guidelines for the
           related to smart agriculture services. These three websites  security of IoT devices, there are guidelines for securing IoT
           were discovered using access information via HTTP or  devices and protecting privacy [26–29], guidelines for data
           HTTPS, which was included in the search results using  protection of IoT devices for consumers [30], specific security
           Shodan in Section 4.  In these three websites, the login  measures that IoT device manufacturers should implement
           screens were accessible from the outside, probably due to  [31], and guidelines in the European Union [32] and
           inappropriate network settings by the administrators. These  Australia [33]. As described above, many legal frameworks
           cases are expected to increase in the future with the spread of  and guidelines regarding security measures and privacy
           smart agriculture.                                 protection for general-purpose IoT devices exist. However,




                                                          – 192 –
   231   232   233   234   235   236   237   238   239   240   241