HomeCII/OTAirline Flight Planning App Vulnerable to Interception Risks

Airline Flight Planning App Vulnerable to Interception Risks

Published on

spot_img

The aviation industry has been put on high alert after it was revealed that an essential mobile app used by many airline pilots was found to have security vulnerabilities that could have compromised safe takeoff and landing procedures. The issues were discovered by researchers at UK-based Pen Test Partners (PTP), who conducted an analysis of the Flysmart+ Manager app developed by NAVBLUE, an IT services company owned by Airbus.

A spokesperson from PTP informed the public that the vulnerability in the Flysmart+ Manager app raised major concerns as it posed a threat to the safety and security of flight operations. The app is a fundamental part of the Electronic Flight Bag (EFB) used by pilots for flight planning calculations and accessing digital documents such as operating manuals, navigational charts, and aircraft checklists.

Upon analyzing the app, researchers identified a disabled App Transport Security (ATS) feature, which would have mandated the use of HTTPS for secure data transmission. Additionally, the app did not have any form of certificate validation, leaving it open to exploitation on open and untrusted networks. As a result, an attacker could potentially intercept and decrypt sensitive information transmitted through the app.

“The EFB is used to calculate the required power from the engines for departure, also the required braking on landing,” explained Ken Munro, a partner at PTP. “We showed that, as a result of the missing ATS setting, one could potentially tamper with the data that is then given to pilots. That data is used during these ‘performance’ calculations, so pilots could apply insufficient power or not enough braking action.”

While the disabled ATS setting posed serious security risks, researchers noted that exploiting the vulnerability was not a straightforward task. An attacker would need to be within Wi-Fi range of the EFB with the vulnerable app, and the attack would only be feasible during an app update. This means the threat actor would need to know when the update was occurring to insert malicious code during the process.

PTP highlighted the fact that conditions for such an attack could occur during pilot layovers, especially since airline EFBs can be exposed to interception on untrusted networks. This is due to the fact that pilots usually bring their EFBs with them during layovers, which makes the devices vulnerable to attacks initiated within the hotel’s Wi-Fi range.

While the specific vulnerability in the Flysmart+ Manager app has been patched, it serves as a reminder of the potential security risks associated with EFBs in the aviation industry. PTP has previously uncovered other vulnerabilities in EFBs, including an integrity check bypass flaw in a Lufthansa EFB app and the ability to modify manuals on an EFB regarding the effectiveness of de-icing procedures on aircraft wings.

With the aviation industry relying heavily on technological advancements, it is crucial for companies to prioritize security and take proactive measures to address potential vulnerabilities in critical applications used for flight operations. The incident serves as a wake-up call for the industry to strengthen security measures and enhance resilience against potential cyber threats that could impact flight safety and security.

Source link

Latest articles

Push for Digital Sovereignty: Essential Insights for CISOs

In early 2026, the French government made a significant announcement that sent ripples throughout...

How Integrated GIS Powers the Next Generation of Industrial Cyber Resilience

The Evolution of Cybersecurity: Bridging the Gap Between GIS and IT/OT Systems In an era...

Cyber Briefing – April 23, 2026 – CyberMaterial

Cybersecurity Update: Emergence of New Threats and Institutional Reactions The cybersecurity landscape continues to evolve...

Apple Resolves iOS Notification Issue Revealing Deleted Messages

Apple Issues Emergency Update to Address Notification Services Vulnerability In a significant move to enhance...

More like this

Push for Digital Sovereignty: Essential Insights for CISOs

In early 2026, the French government made a significant announcement that sent ripples throughout...

How Integrated GIS Powers the Next Generation of Industrial Cyber Resilience

The Evolution of Cybersecurity: Bridging the Gap Between GIS and IT/OT Systems In an era...

Cyber Briefing – April 23, 2026 – CyberMaterial

Cybersecurity Update: Emergence of New Threats and Institutional Reactions The cybersecurity landscape continues to evolve...