Critical Architectural Vulnerabilities in Siemens SIMATIC S7-1500 Series Allow for Bypass of All Protected Boot Features

Tech art image featuring Siemens SIMATIC S7-1500 device for Red Balloon Security's vulnerability discovery report, photo art image

Discover critical architectural vulnerabilities in the Siemens SIMATIC S7-1500 series PLCs that could allow attackers to bypass all protected boot features. Red Balloon’s research reveals that these flaws enable persistent arbitrary modifications of operating code and data, posing significant risks in industrial environments. With the potential for offline attackers to generate bootable firmware for over 100 different CPU modules, the implications are alarming. Siemens has acknowledged these vulnerabilities and is working on solutions. Learn more about the findings, the affected devices, and the recommended mitigations to safeguard your systems against these threats.

Exploring OFRAK’s Minimap View

A bird’s eye view of firmware binaries can helps an engineer situate themselves and accelerates analysis with OFRAK’s Minimap view.

Baets by Der

Friendly advice from Red Balloon Security: Just pay the extra $2 Recently, we wanted to use some wired headphones with an iPhone, which sadly lacks a headphone jack. The nearest deli offered a solution: a Lightning-to-headphone jack adapter for only $7. Got to love your local New York City bodega.    But a wrinkle appeared: […]

Red Balloon Security Wins 2022 NSF Convergence Accelerator Award for Proposed Improvements to 5G Cybersecurity Through Hardening of Embedded Devices

We’re one of 16 teams chosen to enhance the secure operation of 5G infrastructure. Red Balloon Security has received a $682,000 award from the National Science Foundation’s Convergence Accelerator Program, which includes participation in Phase 1 of the program’s Track G: Securely Operating Through 5G Infrastructure. The Department of Defense is aligned with the NSF […]

DEF CON 30 Badge Fun with OFRAK

The TL;DR? We used OFRAK to rewrite the badge firmware so that it auto-plays the solution for Challenge 1. Check out our video and full breakdown.

Embedded Systems and Aerospace & Satellite Cybersecurity

Red Balloon Security White Paper Defending From Within: Why Embedded Systems Are the Essential to Achieving Space and Satellite Cybersecurity Table of Contents:   Executive Summary    State of Cybersecurity in Space and Satellite Systems  The Global Landscape 3 Shaping a Safer Future    RedBalloonSecurity Investigations  CyberLeo 2022 Defend from Within: Symbiote Embedded Defense for Satellite […]

ICS-CERT vulnerability analysis

What’s in a vulnerability: Evaluating host-based defense through recent ICS device data We analyzed data from the national vulnerability database to assess the applicability of on-device security features Whether they are discovered by independent researchers, manufacturers, or cyber attackers, device vulnerabilities traditionally have been remedied via patching. Although reactive, patching’s effectiveness is easy enough to […]