dc.contributor.author | Juvonen, Artturi | |
dc.contributor.author | Costin, Andrei | |
dc.contributor.author | Turtiainen, Hannu | |
dc.contributor.author | Hämäläinen, Timo | |
dc.date.accessioned | 2023-01-09T12:45:04Z | |
dc.date.available | 2023-01-09T12:45:04Z | |
dc.date.issued | 2022 | |
dc.identifier.citation | Juvonen, A., Costin, A., Turtiainen, H., & Hämäläinen, T. (2022). On Apache Log4j2 Exploitation in Aeronautical, Maritime, and Aerospace Communication. <i>IEEE Access</i>, <i>10</i>, 86542-86557. <a href="https://doi.org/10.1109/ACCESS.2022.3198947" target="_blank">https://doi.org/10.1109/ACCESS.2022.3198947</a> | |
dc.identifier.other | CONVID_156493259 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/84864 | |
dc.description.abstract | Apache Log4j2 is a prevalent logging library for Java-based applications. In December 2021, several critical and high-impact software vulnerabilities, including CVE-2021-44228, were publicly disclosed, enabling remote code execution (RCE) and denial of service (DoS) attacks. To date, these vulnerabilities are considered critical and the consequences of their disclosure far-reaching. The vulnerabilities potentially affect a wide range of internet of things (IoT) devices, embedded devices, critical infrastructure (CI), and cyber-physical systems (CPSs). In this paper, we study the effects and feasibility of exploiting these vulnerabilities in mission-critical aviation and maritime environments using the ACARS, ADS-B, and AIS protocols. We develop a systematic methodology and an experimental setup to study and identify the protocols’ exploitable fields and associated attack payload features. For our experiments, we employ software-defined radios (SDRs), use open-source software, develop novel tools, and develop features to existing software. We evaluate the feasibility of the attacks and demonstrate end-to-end RCE with all three studied protocols. We demonstrate that the aviation and maritime environments are susceptible to the exploitation of the Log4j2 vulnerabilities, and that the attacks are feasible for non-sophisticated attackers. To facilitate further studies related to Log4j2 attacks on aerospace, aviation, and maritime infrastructures, we release relevant artifacts (e.g., software, documentation, and scripts) as open-source, complemented by patches for bugs in open-source software used in this study. | en |
dc.format.mimetype | application/pdf | |
dc.language.iso | eng | |
dc.publisher | Institute of Electrical and Electronics Engineers (IEEE) | |
dc.relation.ispartofseries | IEEE Access | |
dc.rights | CC BY 4.0 | |
dc.subject.other | CVE-2021-44228 | |
dc.subject.other | log4j | |
dc.subject.other | log4shell | |
dc.subject.other | vulnerability | |
dc.subject.other | exploitation | |
dc.subject.other | experimentation | |
dc.subject.other | proof-of-concept | |
dc.subject.other | aviation | |
dc.subject.other | avionics | |
dc.subject.other | ACARS | |
dc.subject.other | ADS-B | |
dc.subject.other | maritime | |
dc.subject.other | AIS | |
dc.subject.other | aerospace | |
dc.subject.other | satellite | |
dc.title | On Apache Log4j2 Exploitation in Aeronautical, Maritime, and Aerospace Communication | |
dc.type | article | |
dc.identifier.urn | URN:NBN:fi:jyu-202301091213 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.contributor.oppiaine | Tietotekniikka | fi |
dc.contributor.oppiaine | Secure Communications Engineering and Signal Processing | fi |
dc.contributor.oppiaine | Tekniikka | fi |
dc.contributor.oppiaine | Mathematical Information Technology | en |
dc.contributor.oppiaine | Secure Communications Engineering and Signal Processing | en |
dc.contributor.oppiaine | Engineering | en |
dc.type.uri | http://purl.org/eprint/type/JournalArticle | |
dc.type.coar | http://purl.org/coar/resource_type/c_2df8fbb1 | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 86542-86557 | |
dc.relation.issn | 2169-3536 | |
dc.relation.volume | 10 | |
dc.type.version | publishedVersion | |
dc.rights.copyright | © The Authors 2022 | |
dc.rights.accesslevel | openAccess | fi |
dc.subject.yso | langaton tiedonsiirto | |
dc.subject.yso | tietoliikennesatelliitit | |
dc.subject.yso | langaton viestintä | |
dc.subject.yso | Java | |
dc.subject.yso | meriliikenne | |
dc.subject.yso | lentoliikenne | |
dc.subject.yso | verkkohyökkäykset | |
dc.subject.yso | lennonvarmistus | |
dc.subject.yso | Apache | |
dc.subject.yso | haavoittuvuus | |
dc.subject.yso | kyberturvallisuus | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p5445 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p5595 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p5443 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p16144 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p2046 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p4262 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p27466 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p14938 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p6068 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p25011 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p26189 | |
dc.rights.url | https://creativecommons.org/licenses/by/4.0/ | |
dc.relation.doi | 10.1109/ACCESS.2022.3198947 | |
jyx.fundinginformation | This work was supported in part by the Finnish Grid and Cloud Infrastructure (FGCI) (persistent identifier urn:nbn:fi:research-infras-2016072533); in part by the Decisions of the Research Dean on Research through the Faculty of Information Technology, University of Jyväskylä, in April 2021 and April 2022; and in part by the Finnish Cultural Foundation under Grant 00221059. The work of Hannu Turtiainen was supported by the Finnish Cultural Foundation/Suomen Kulttuurirahasto (https://skr.fi/en) for supporting his Ph.D. Dissertation Work and Research under Grant 00221059. The work of Timo Hämäläinen was supported by the Faculty of Information Technology, University of Jyväskylä (JYU), for partly supporting his Ph.D. supervision at JYU during (2021–2023). | |
dc.type.okm | A1 | |