GAO: Newer aircraft vulnerable to hacking
WASHINGTON (CNN) — Hundreds of planes flying commercially today could be vulnerable to having their onboard computers hacked and remotely taken over by someone using the plane’s passenger Wi-Fi network, or even by someone on the ground, according to a new report from the Government Accountability Office.
One of the authors of the report, Gerald Dillingham, told CNN the planes include the Boeing 787 Dreamliner, the Airbus A350 and A380 aircraft, and all have advanced cockpits that are wired into the same Wi-Fi system used by passengers.
“Modern communications technologies, including IP connectivity, are increasingly used in aircraft systems, creating the possibility that unauthorized individuals might access and compromise aircraft avionics systems,” according to the report, which is based on interviews with cybersecurity and aviation experts.
The government investigators who wrote the report say it is theoretically possible for someone with just a laptop to:
- Commandeer the aircraft
- Put a virus into flight control computers
- Jeopardize the safety of the flight by taking control of computers
- Take over the warning systems or even navigation systems
Dillingham says although modern aircraft could be vulnerable, there are a number of redundancy mechanisms built into the plane systems that could allow a pilot to correct a problem.
The report explains that as the air traffic control system is upgraded to use Internet-based technology on both the ground and in planes, avionics could be compromised. Older planes systems aren’t highly Internet-based, so the risk for aircraft 20 years and older is less.
The GAO report does not draw a roadmap on how this could be done, but it does say someone would have to bypass the firewall that separates the Wi-Fi from the rest of the plane’s electronics. GAO Investigators say they spoke with four cybersecurity experts about the firewall vulnerabilities, “and all four said that because firewalls are software components, they could be hacked like any other software and circumvented.”
Commercial pilot John Barton told CNN, “We’ve had hackers get into the Pentagon, so getting into an airplane computer system I would think is probably quite easy at this point.”
The report continues, “According to cybersecurity experts we interviewed, Internet connectivity in the cabin should be considered a direct link between the aircraft and the outside world, which includes potential malicious actors.”
“A virus or malware planted in websites visited by passengers could provide an opportunity for a malicious attacker to access the IP-connected onboard information system through their infected machines,” according to the report.
It says another way a hacker could get access to a plane’s computers is through a physical connection and notes that whenever there is a physical linkage, such as a USB plug in a passenger seat, if those wires are linked in any way to the airplane’s avionics, that linkage creates a vulnerability.
Experts told investigators, “If the cabin systems connect to the cockpit avionics systems and use the same networking platform, in this case IP, a user could subvert the firewall and access the cockpit avionics system from the cabin.”
Members of the House Transportation and Infrastructure Committee, along with senators on the Commerce Committee, requested the report. Rep. Peter DeFazio, D-Oregon, who is the ranking member of the House committee, tells CNN, “This report exposed a real and serious threat — cyberattacks on an aircraft in flight.”
He says that the Federal Aviation Administration “must focus on aircraft certification standards that would prevent a terrorist with a laptop in the cabin or on the ground from taking control of an airplane through the passenger Wi-Fi system. That’s a serious vulnerability.”
The report concludes that the FAA needs to work on certification of aircraft avionics that will account for these vulnerabilities and remove them as possible threats to commercial aviation.
A source briefed on the report tells CNN that cybersecurity experts say these vulnerabilities exist and these scenarios are possible. But it is unclear how far the GAO went to test any of these possible scenarios. In the report, the GAO does not say whether this is based on actual testing or just theoretical mockups.
Pilot Barton notes, “This is going to take a long time, vetted by the best experts in the world and safety people to make this technology secure and safe.”
In a letter to the GAO, Keith Washington, acting assistant secretary for administration with the FAA, said the agency “recognizes that cyberbased threats to federal information systems are becoming a more significant risk and are rapidly evolving and increasingly difficult to detect and defend against. We take this risk very seriously.”
Washington went on to say “It is also important to note that the FAA had already initiated a comprehensive program to improve the cybersecurity defenses of the NAS (National Airspace System) infrastructure, as well as other FAA mission-critical systems. We are significantly increasing our collaboration and coordination with cyber intelligence and security organizations across the federal government and in the private sector.”
“The Dreamliner and the A350 were actually designed to have the technology in it going forward to be able to have remote control intervention between the pilot and the ground or if an emergency were to happen in the air,” Barton said. But he quickly added, “It’s going to take a long time before we get to the point where that technology is safe and secure.”
Boeing said it is committed to designing secure aircraft and issued this statement:
“Boeing airplanes have more than one navigational system available to pilots. No changes to the flight plans loaded into the airplane systems can take place without pilot review and approval. In addition, other systems, multiple security measures, and flight deck operating procedures help ensure safe and secure airplane operations.”
Airbus released a statement, which read:
“Airbus, in partnership with our suppliers, constantly assesses and revisits the system architecture of our products, with an eye to establishing and maintaining the highest standards of safety and security. Beyond that, we don’t discuss design details or safeguards publicly, as such discussion might be counterproductive to security.”