Emergency Alert System(EAS) Vulnerability

We recently became aware of certain vulnerabilities in EAS encoder/decoder devices that, if not updated to most recent software versions, could allow an actor to issue EAS alerts over the host infrastructure (TV, radio, cable network).

This exploit was successfully demonstrated by Ken Pyle, a security researcher at CYBIR.com, and may be presented as a proof of concept at the upcoming DEFCON 2022 conference in Las Vegas, August 11-14.

FEMA strongly encourages EAS participants to ensure that:

  • EAS devices and supporting systems are up to date with the most recent software versions and security patches.
  • EAS devices are protected by a firewall.
  • EAS devices and supporting systems are monitored and audit logs are regularly reviewed looking for unauthorized access.
  • We value our partnership with broadcasters and appreciate your efforts to maintain public trust and confidence in the Emergency Alert System.

For Further Reference

https://content.govdelivery.com/accounts/USDHSFEMA/bulletins/3263326

要查看或添加评论,请登录

Cyber Castrum LLP的更多文章

社区洞察

其他会员也浏览了