Bug Allows Addition of Fake Pilots to TSA Check Rosters

Published:

The TSA Security Vulnerability: A Critical Threat to Airline Safety

In a shocking revelation, security researchers uncovered a serious vulnerability in the login systems used by the Transportation Security Administration (TSA) to verify airline crew members at airport security checkpoints. This flaw allowed individuals with basic knowledge of SQL injection to manipulate airline rosters, potentially granting unauthorized access to secure areas such as the cockpit of a commercial airplane. Ian Carroll detailed this alarming discovery in a blog post back in August.

The Discovery of the Vulnerability

Carroll and his colleague, Sam Curry, stumbled upon the vulnerability while investigating the third-party website of FlyCASS, a vendor that provides smaller airlines access to the TSA’s Known Crewmember (KCM) system and Cockpit Access Security System (CASS). By inserting a simple apostrophe into the username field, they triggered a MySQL error, indicating a potential SQL injection point.

sajdhasd

Further exploration revealed that the username was directly embedded into the login SQL query, paving the way for a successful SQL injection attack. With the use of tools like sqlmap, they were able to confirm the presence of the vulnerability. By inputting a specific username and password combination, they gained unauthorized access to FlyCASS as an administrator of Air Transport International.

The Implications of the Security Flaw

Once inside the system, Carroll noted a glaring absence of further authentication checks, enabling them to manipulate crew records and photos for any airline utilizing FlyCASS. This breach could potentially allow unauthorized individuals to pass through KCM security checkpoints by presenting a fake employee number.

In response to these findings, TSA press secretary R. Carter Langston refuted the severity of the situation, asserting that flight crew authentication does not solely rely on the compromised database. Langston emphasized that only verified crew members are granted access to secure airport areas.

Conclusion

The TSA security vulnerability uncovered by Carroll and Curry sheds light on the critical importance of robust cybersecurity measures in the aviation industry. As threats evolve, proactive detection and mitigation strategies are imperative to safeguarding passenger safety and maintaining the integrity of air travel.

FAQs

Q: How did the security researchers discover the vulnerability?

A: Carroll and Curry identified the vulnerability by probing the third-party website of FlyCASS and noticing anomalies in the login system’s response to SQL injection attempts.

Q: What were the potential consequences of exploiting this security flaw?

A: Unauthorized individuals could manipulate airline rosters, gain access to secure areas like the cockpit, and bypass security checkpoints by exploiting the vulnerability.


Credit: www.theverge.com

Related articles

You May Also Like