End-of-Train and Head-of-Train Remote Linking Protocol (Update C)
A vulnerability in End-of-Train and Head-of-Train remote linking protocols allows an attacker with network access to send unauthorized brake control commands to these devices. Successful exploitation could cause sudden train stoppage or induce brake failure, disrupting rail operations. The vulnerability affects all versions of the protocol used by multiple manufacturers including Wabtec, Siemens, and DPS Electronics. The protocol is maintained by the Association of American Railroads (AAR) Railroad Electronics Standards Committee. No patch is planned; the AAR is developing replacement equipment and protocols to address this issue.
- Network access to the EoT/HoT device (local network only; not exploitable over the internet)
- Ability to send messages on the protocol used by the device
- No authentication or valid credentials required
/api/v1/advisories/ea5bffdc-aa63-499b-b3c8-8fd6a858a798Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.