- cross-posted to:
- [email protected]
- cross-posted to:
- [email protected]
bosch rexroth nutrunner
What a name for a wrench.
It’s also not much of a surprise that it has a vulnerability, many embedded networked devices are vulnerable to tons of exploits, and security research on this type of stuff is difficult because it often requires an extensive skillset
This is the best summary I could come up with:
Researchers have unearthed nearly two dozen vulnerabilities that could allow hackers to sabotage or disable a popular line of network-connected wrenches that factories around the world use to assemble sensitive instruments and devices.
The vulnerabilities, reported Tuesday by researchers from security firm Nozomi, reside in the Bosch Rexroth Handheld Nutrunner NXA015S-36V-B.
The cordless device, which wirelessly connects to the local network of organizations that use it, allows engineers to tighten bolts and other mechanical fastenings to precise torque levels that are critical for safety and reliability.
The Nutrunner provides a torque-level indicator display that’s backed by a certification from the Association of German Engineers and adopted by the automotive industry in 1999.
The malware could then be used to disable entire fleets of the devices or to cause them to tighten fastenings too loosely or tightly while the display continues to indicate the critical settings are still properly in place.
The vulnerabilities found on the Bosch Rexroth NXA015S-36V-B allow an unauthenticated attacker who is able to send network packets to the target device to obtain remote execution of arbitrary code (RCE) with root privileges, completely compromising it.
The original article contains 344 words, the summary contains 187 words. Saved 46%. I’m a bot and I’m open source!