Close Menu
The LinkxThe Linkx
  • Home
  • Technology
    • Gadgets
    • IoT
    • Mobile
    • Nanotechnology
    • Green Technology
  • Trending
  • Advertising
  • Social Media
    • Branding
    • Email Marketing
    • Video Marketing
  • Shop

Subscribe to Updates

Get the latest tech news from thelinkx.com about tech, gadgets and trendings.

Please enable JavaScript in your browser to complete this form.
Loading
What's Hot

Amazon sells MOBA March of Giants to Ubisoft

December 15, 2025

Renewable Energy, Economics, & Inertia

December 15, 2025

OnePlus is cooking up a brand new phone series for 2026 — but will you…

December 15, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram Pinterest Vimeo
The LinkxThe Linkx
  • Home
  • Technology
    • Gadgets
    • IoT
    • Mobile
    • Nanotechnology
    • Green Technology
  • Trending
  • Advertising
  • Social Media
    • Branding
    • Email Marketing
    • Video Marketing
  • Shop
The LinkxThe Linkx
Home»Trending»Was that device designed to be on the internet at all?
Trending

Was that device designed to be on the internet at all?

Editor-In-ChiefBy Editor-In-ChiefDecember 13, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Was that device designed to be on the internet at all?
Share
Facebook Twitter LinkedIn Pinterest Email


Behind the polished exterior of many modern buildings sit outdated systems with vulnerabilities waiting to be found

Tony Anscombe

12 Dec 2025
 • 
,
3 min. read

Black Hat Europe 2025: Was that device designed to be on the internet at all?

“A City of a Thousand Zero Days” is the partial title of a talk at Black Hat Europe 2025. I am sure you will appreciate why these few words sparked my interest enough to dedicate time to the presentation; especially given that back in 2019 I delivered a talk on the evolving risk of smart buildings at Segurinfo in Argentina.

The talk at Black Hat, delivered by Gjoko Krstic of Zero Science Lab, focused on one vendor of building management systems and how the evolution of one of their products through various acquisitions caused it to end up being an incredibly vulnerable piece of software. In summary, the talk highlighted that there are over 1,000 buildings around the world that use the vendor’s building management system (BMS) running on a software platform with a long list of vulnerabilities. Compounding the issue, the software is hosted on public-facing IP addresses; thus, it’s accessible from the internet.

In one example, Gjoko explained the root cause of one vulnerability dates back to an 18-year-old firmware codebase. Through several company acquisitions and a lack of audit and due diligence during the merger and acquisition process on the security aspects of the software, vulnerabilities appear to have been largely ignored until recently.

Coordinated disclosure has prompted numerous fixes, but the process has resulted in fixing one problem while leaving the root cause intact, thus exposing further vulnerabilities later. The message here is clear: don’t just use a sticking plaster while ignoring the underlying cause. It’s essential that companies conduct full code audits after a vulnerability notification and release a patch to ensure the root cause is identified and resolved.

While the white paper that accompanies the talk offers several messages for software developers of critical infrastructure systems, there is one that I feel needs to pushed to the front. Back in 2017, my colleagues at ESET published details of one of the first known malware to target Industrial Control Systems (ICS) and the very first one to specifically target power grids. One comment I distinctly remember from the research is that the protocol used by the ICS device concerned was never designed to be connected to the internet.

The talk by Gjoko raised a similar concern: the building management system was not designed to be public facing on the internet, and the vendor recommends to secure it behind a virtual private network (VPN).

Asking for trouble

While vulnerabilities in software are, of course, an issue and I commend the detailed research, there is a wider issue: some systems available on public IP addresses should really be protected through additional security layers, such as a VPN.

Building management systems are one example of this. The issue here may stem from building ownership as opposed to tenant control: the landlord may not have the knowledge, resources or risk-averse approach to security that the tenant has; at the same time, the tenant may not realize the significant risk to their business being caused by a lack of security relating to the building services.

The potential risk is significant. For example, a malicious actor who can control and adjust the heat in a server room could cause operational disruption or, by using the fire controls to release all doors, they could let unauthorized people into the building (this sounds a bit Mission: Impossible, but is very plausible). All companies need to ensure the services that form the fabric of their buildings are secured to the same level as their own corporate systems, are patched regularly and audited on a similar cadence to their cybersecurity audits.

There are other types of systems that remain publicly accessible despite overwhelming reasons for them to be behind another security layer. An example is remote desktop protocol (RDP) servers, some without multi-factor-authentication, are still accessible on public IP addresses.

As a principle, if bypassing or compromising a login screen results in direct access to an application or corporate network, then there should be enhanced security using a VPN or similar technology. At some stage, a cybercriminal will find a vulnerability, socially engineer login credentials or brute force access to the system. It’s just a matter of time and is something that is easily avoidable.



Source link

designed device INTERNET
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleMeta Outlines Latest Data on Content Removals and Fake Accounts
Next Article 11 Holiday Gifts Your Co-Workers and Employees Will Truly Appreciate
Editor-In-Chief
  • Website

Related Posts

Trending

Data Analytics and the New Era of Gold Trading

December 15, 2025
Trending

Update Now: iOS 26.2 Fixes 20+ Security Vulnerabilities

December 12, 2025
IoT

The Phone That Serves You, Not Platforms – THE INTERNET OF THINGS

December 11, 2025
Add A Comment
Leave A Reply Cancel Reply

Top Posts

100+ TikTok Statistics Updated for December 2024

December 4, 2024109 Views

How to Fix Cant Sign in Apple Account, Verification Code Not Received …

February 11, 202577 Views

BenQ PD2730S Review – MacRumors

February 14, 202534 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Latest Reviews

Subscribe to Updates

Get the latest tech news from thelinkx.com about tech, gadgets and trendings.

Please enable JavaScript in your browser to complete this form.
Loading
About Us

Welcome to TheLinkX – your trusted source for everything tech and gadgets! We’re passionate about exploring the latest innovations, diving deep into emerging trends, and helping you find the best tech products to suit your needs. Our mission is simple: to make technology accessible, engaging, and inspiring for everyone, from tech enthusiasts to casual users.

Our Picks

Amazon sells MOBA March of Giants to Ubisoft

December 15, 2025

Renewable Energy, Economics, & Inertia

December 15, 2025

OnePlus is cooking up a brand new phone series for 2026 — but will you…

December 15, 2025

Subscribe to Updates

Get the latest tech news from thelinkx.com about tech, gadgets and trendings.

Please enable JavaScript in your browser to complete this form.
Loading
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms and Conditions
© 2025 Thelinkx.All Rights Reserved Designed by Prince Ayaan

Type above and press Enter to search. Press Esc to cancel.