LISTENING IN: Columbia University researchers showed recently how to remotely turn on a Cisco IP phone's microphones. Photo: Red Balloon Security
All current Cisco IP phones, including the ones seen on desks in the White House and aboard Air Force One, have a vulnerability that allows hackers to take complete control of the devices. Now computer scientists at Columbia University have developed a defense they call a “symbiote” that can detect any such intrusions. [Editor’s note: IEEE Spectrum uses Cisco IP phones too.]
The Columbia researchers discovered bugs in the phone’s kernel—essentially, the heart of its operating system—that can give intruders total access to the phones [PDF]. Once hackers are inside a phone, they can turn on its microphones, transforming it into an eavesdropping device. They can also use a compromised phone as the staging area for attacks on other phones—and on computers and devices such as printers—connected to the same network. The researchers, including computer scientist Ang Cui, reported the vulnerability to Cisco on 22 October 2012, within a few days of discovering and verifying the bug.
Although the attack the researchers originally documented relies on physical access to target phones, Cui says it’s possible to compromise the telephones remotely via the Internet. “This problem is not unique to Cisco,” adds Salvatore Stolfo, a computer science professor at Columbia University. “Avaya and other phone vendors undoubtedly have similar issues with their software.”
Such problems reflect the vulnerability of embedded systems—the near-ubiquitous computers found in printers, routers, and phones as well as cars, rail lines, power plants, prison-cell doors, and implantable medical devices. Computer security has largely focused on personal computers and not on the embedded systems that make up large parts of government and corporate infrastructures, Cui says.
Now the Columbia team says it has forged a new weapon that can defend Cisco phones against such exploits. The new anti-malware software, which they call symbiotes [PDF], resides directly in the embedded system’s firmware, continuously scanning random chunks of the programs running the system to check for anomalies. In essence, say the Columbia researchers, the symbiote serves as an immune system against intrusions. When the researchers demonstrated the attack that turns a Cisco phone into a listening post, the symbiote-protected phone signaled with a flashing red light. It also called Cui with a message: “My IP phone has been pwned.” (“Pwned” is hacker slang for “owned.”) “This is the first IP phone with an antivirus on it,” Stolfo says.
One key advantage of symbiotes is that they could detect unanticipated or “zero-day” attacks, Stolfo says, unlike anti-malware programs that rely on known patterns of misbehavior. “The symbiote doesn’t know all the vulnerabilities of what it’s protecting, just what the consequences of an exploit would look like,” Cui explains. The Columbia researchers, who are commercializing their work via their start-up Red Balloon Security, report that the symbiote devised for Cisco phones takes up just 200 bytes of data. The software scans the host phone’s kernel a few hundred times per second for intrusions, Cui says.
For its part, Cisco says it is working on a permanent fix for this vulnerability and has released an interim software update to protect customers. However, Stolfo says, Cisco’s solution involves disabling the phone’s secure data communication, or SSH server, as well as its PC port. So although the phones will be more secure, they will no longer let users manage them remotely, significantly limiting their utility.
Stolfo cautions that the symbiote still needs to be tested on real networks. Still, if and when symbiotes are deployed en masse, “we’ll be able to prevent large-scale exploits of embedded systems for 10 years, in my estimation,” Stolfo says. For added defense, future symbiotes may be able to monitor not only the device in which they reside but also other devices connected to the same network, Cui adds.
The researchers, who will detail their latest findings on 28 February at the RSA Conference in San Francisco, are now talking with companies and government agencies about incorporating symbiotes into embedded systems on a large scale.
Charles Q. Choi is a science reporter who contributes regularly to IEEE Spectrum. He has written for Scientific American, The New York Times, Wired, Science, Nature, Popular Science, and National Geographic News, among others. For his work, he has hunted for mammoth DNA in Yukon, faced gunmen in Guatemala, entered the sarcophagus housing radioactive ruins in Chernobyl, and looked for mammal fossils in Wyoming based on the guidance from an artificial intelligence. In his spare time, Charles has traveled to all seven continents, including scaling the side of an iceberg in Antarctica, investigating mummies from Siberia, snorkeling in the Galápagos Islands, excavating ancient Mayan ruins in Belize, climbing Mt. Kilimanjaro, camping in the Outback, and avoiding thieves near Shaolin Temple.