Incident Response, Network Security, TDR, Vulnerability Management

Threat of the month: Compromised embedded systems

What is it?
Embedded systems are small computing or logic devices that can connect to the internet. These are often deployed without network perimeter protection, such as a firewall. These devices are seldom patched, leaving them vulnerable to remote and local exploits.

How does it work?
The embedded systems are deployed with default configurations, so attackers can easily login and change critical systems, potentially causing real-world damage.

Should I be worried?
Embedded systems are usually treated with less security focus than workstations or servers, which is a huge mistake.

How can I prevent it?
I recommend placing devices behind network perimeter devices when possible. Default usernames and authentication credentials should also be changed. Another preventative measure is ensuring all embedded devices have up-to-date firmware/software.

An In-Depth Guide to Network Security

Get essential knowledge and practical strategies to fortify your network security.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds