• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

NASA helped find a network security hole in spacecraft networks

You are here: Home / Computers and Smartphones / NASA helped find a network security hole in spacecraft networks

J. Fingas@jonfingasNovember 15, 2022 1:20 PMIn this posting: infrastructure, information, gear, NASA, plane, vulnerability, security, energy, Ethernet, College of Michigan, networking, spacecraft, SpaceXNASA/Bill Ingalls

NASA and College of Michigan researchers have identified a security flaw that could pose a menace to spacecraft in the right (or fairly, wrong) circumstances. The crew has learned that time-brought on Ethernet (TTE), a feature that lets critical units sit along with minor ones on the exact networking components, is susceptible to a spoofing attack. An intruder can mail fake sync messages by conducting electromagnetic interference by copper Ethernet cables into network switches, generating a “hole” in a switch’s action that allows bogus facts slide by means of. About time, the TTE product will shed sync and behave erratically.

The attack calls for positioning a compact product on the network, so remote breaches are unlikely. Nonetheless, the consequences could be significant. The researchers examined the vulnerability utilizing real NASA equipment to recreate a planned asteroid redirection test. In a simulation, the TTE exploit developed a knock-on influence intense enough that the crew capsule strayed from its training course and missed a vital docking course of action.

iThis information is not obtainable due to your privacy preferences. Update your options in this article, then reload the website page to see it.

There are basic safeguards, if not automatically challenge-no cost. Automobile designers could change copper Ethernet with fiber optic cables or put optical isolators amongst switches and gadgets, so long as they’re keen to take sacrifices in price and effectiveness. Engineers could also adjust the network layout to protect against phony sync messages from having the similar route as legit kinds, though that will obviously take time.

NASA and the university worry that there is no “recent” acknowledged danger. On the other hand, the process could also be made use of to compromise aircraft, power plants and industrial control techniques that count on TTE. Theoretically, a saboteur with actual physical access could disrupt critical infrastructure in a way that may well not be straight away obvious.

All merchandise recommended by Engadget are chosen by our editorial group, unbiased of our guardian enterprise. Some of our stories contain affiliate one-way links. If you buy something by means of 1 of these back links, we may generate an affiliate fee. All selling prices are right at the time of publishing.


Some parts of this article are sourced from:
engadget.com

Previous Post: « State-Backed APT Group Activity Continuing Apace
Next Post: Botnets, Trojans, DDoS From Ukraine and Russia Have Increased Since Invasion »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Former Black Basta Members Use Microsoft Teams and Python Scripts in 2025 Attacks
  • 295 Malicious IPs Launch Coordinated Brute-Force Attacks on Apache Tomcat Manager
  • INTERPOL Dismantles 20,000+ Malicious IPs Linked to 69 Malware Variants in Operation Secure
  • Why DNS Security Is Your First Defense Against Cyber Attacks?
  • SinoTrack GPS Devices Vulnerable to Remote Vehicle Control via Default Passwords

Copyright © 2025 ยท AllTech.News, All Rights Reserved.