On Apache Log4j2 Exploitation in Aeronautical, Maritime, and Aerospace Communication

被引:9
作者
Juvonen, Artturi [1 ]
Costin, Andrei [1 ]
Turtiainen, Hannu [1 ]
Hamalainen, Timo [1 ]
机构
[1] Univ Jyvaskyla, Fac Informat Technol, Jyvaskyla 40014, Finland
关键词
Protocols; Artificial intelligence; Satellites; !text type='Java']Java[!/text; Mission critical systems; Information systems; Codes; Aerospace engineering; Maritime communication; Proof of Work; CVE-2021-44228; log4j; log4shell; vulnerability; exploitation; experimentation; proof-of-concept; aviation; avionics; ACARS; ADS-B; maritime; AIS; aerospace; satellite;
D O I
10.1109/ACCESS.2022.3198947
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Apache Log4j2 is a prevalent logging library for Java-based applications. In December 2021, several critical and high-impact software vulnerabilities, including CVE-2021-44228, were publicly disclosed, enabling remote code execution (RCE) and denial of service (DoS) attacks. To date, these vulnerabilities are considered critical and the consequences of their disclosure far-reaching. The vulnerabilities potentially affect a wide range of internet of things (IoT) devices, embedded devices, critical infrastructure (CI), and cyber-physical systems (CPSs). In this paper, we study the effects and feasibility of exploiting these vulnerabilities in mission-critical aviation and maritime environments using the ACARS, ADS-B, and AIS protocols. We develop a systematic methodology and an experimental setup to study and identify the protocols' exploitable fields and associated attack payload features. For our experiments, we employ software-defined radios (SDRs), use open-source software, develop novel tools, and develop features to existing software. We evaluate the feasibility of the attacks and demonstrate end-to-end RCE with all three studied protocols. We demonstrate that the aviation and maritime environments are susceptible to the exploitation of the Log4j2 vulnerabilities, and that the attacks are feasible for non-sophisticated attackers. To facilitate further studies related to Log4j2 attacks on aerospace, aviation, and maritime infrastructures, we release relevant artifacts (e.g., software, documentation, and scripts) as open-source, complemented by patches for bugs in open-source software used in this study.
引用
收藏
页码:86542 / 86557
页数:16
相关论文
共 57 条
[1]  
[Anonymous], 2016, GLOB AIR NAV PLAN 20
[2]  
[Anonymous], 2017, M24130 ITUR
[3]  
[Anonymous], 2013, DAT LINK PERF MON L8
[4]  
[Anonymous], 2016, ARINC618
[5]  
[Anonymous], 2014, PRELIMINARY REPORT C
[6]  
[Anonymous], 2021, TRAFICOM185774030405
[7]  
[Anonymous], 2022, BINARES FIRMWARE INS
[8]  
[Anonymous], 2021, Understanding the Impact of Apache Log4j Vulnerability
[9]  
[Anonymous], 2021, CVE202145046 MITRE
[10]  
[Anonymous], 2021, NVDCVE202145046 NIST