PDQ Manufacturing, Inc. LaserWash / Digi, Ludlum, and Mirion
By Mark Perry on August 2, 2017
PDQ Manufacturing, Inc. LaserWash, Laser Jet and ProTouch
Digi, Ludlum, and Mirion
Continuing the theme of vulnerable IoT devices, researcher Ruben Santamarta uncovered vulnerabilities in radioactivity sensors made to detect and prevent radioactive contamination. The first sensor he looked at is a common model found in nuclear power plants; the next models are used at various check points. These sensors are commonly called “gate” monitoring systems and are found at vehicle inspection points including border crossing points. These sensors do not deal directly with radiation and are just sensors, so at first being vulnerable to manipulation doesn’t seem like that big of a deal. Let’s refer back to 3-mile Island where a faulty sensor caused a false read and ended in a nuclear melt-down in 1979. Ruben was sure that malicious leverage of this vulnerability could lead to something similar. The first model he researched was the Model 53 Gamma Personnel Portal from Ludlum. He found a default backdoor password. This vulnerability could allow an attacker to take control of the system and disable the device preventing any alarms from going off. The next model was another Ludlum monitor — in this case, the Model 4525. Ruben found these devices communicated in plain text using protocols such as Port 20034/UDP and Port 23/TCP and lacked any type of security measure, which could allow an attacker to gain enough information to change the devices’ network settings, and also gain the ability to send false information to the alarm system, effectively disabling it or triggering the alarm to induce an evacuation, buying time for other malicious attacks to take place. Digi models were susceptible to firmware reverse engineering, allowing hackers to modify the firmware for their own ends. Ruben reached out to the vendors to disclose his findings but did not get a response and publicly disclosed this information at BlackHat 2017. This issue is so widespread, and because of the potential for human harm ICS-CERT has issued an Advisory (ICSA-17- 208-02) and has given this vulnerability a CVSS3 score of 5.0.
(Update)
Digi- acknowledged the report, but will not fix the issues as they do not consider them security issues.
Ludlum – acknowledged the report, but refused to address the issues. According to them, these devices are located in secure facilities, which is enough to prevent exploitation.
Mirion – acknowledged the vulnerabilities, but will not patch them as it would break WRM2 interoperability. Mirion contacted their customers to warn of this situation. They will work in the future to add additional security measures.
-
CrushFTP CVE-2025-31161 Vulnerability
CrushFTP CVE-2025-31161 Vulnerability
4/11/2025 -
Active Exploitation of Apache Tomcat CVE-2025-24813 Vulnerability
Active Exploitation of Apache Tomcat CVE-2025-24813 Vulnerability
4/4/2025 -
Next.js Middleware CVE-2025-29927 Vulnerability
Next.js Middleware CVE-2025-29927 Vulnerability
4/4/2025