Boeing completes first 787-9 Dreamliner.
courtesy Boeing
Boeing completes first 787-9 Dreamliner.
Now playing
02:33
Government warning: New planes vulnerable to hackers
Dr. James Yaingeluo
Now playing
01:19
Plane lands short of runway, crashes into sea
Now playing
01:03
See jet's white-knuckle landing attempt
courtesy larry coben
Now playing
02:16
Passenger describes being quarantined on plane
WZTV
Now playing
01:20
Passengers on plane possibly exposed to illness
burbank airport plane fight
Twitter/Nick Krause
burbank airport plane fight
Now playing
00:49
Fight erupts aboard Southwest flight
Shutterstock
Now playing
01:18
Scorpion stings passenger on United flight
Passenger chases plane on tarmac orig vstop dlewis_00000000.jpg
CC.OO. Ryanair & Lesma Handling
Passenger chases plane on tarmac orig vstop dlewis_00000000.jpg
Now playing
00:50
Passenger chases plane on tarmac
Courtesy Spirit Airlines
Now playing
00:50
Woman gives birth midair on Spirit flight
The engine on a Southwest Airlines plane is inspected as it sits on the runway at the Philadelphia International Airport after it made an emergency landing in Philadelphia, Tuesday, April 17, 2018. (Amanda Bourman via AP)
Amanda Bourman/AP
The engine on a Southwest Airlines plane is inspected as it sits on the runway at the Philadelphia International Airport after it made an emergency landing in Philadelphia, Tuesday, April 17, 2018. (Amanda Bourman via AP)
Now playing
01:07
Nurse on plane: Made every effort to save woman
(180514) -- CHENGDU, May 14, 2018 (Xinhua) -- Flight 3U8633, operated by Sichuan Airlines, prepares to conduct emergency landing after a mechanical failure in Chengdu Shuangliu International Airport in Chengdu, capital of southwest China's Sichuan Province, May 14, 2018. Part of the cockpit window broke as the Airbus A319 flew over Chengdu. The plane was en route from southwest China's Chongqing Municipality to Lhasa, capital of Tibet Autonomous Region. It was forced to divert to an alternate airport in Chengdu. All passengers are safe, although the co-pilot sustained injuries to the face and waist, and another crew member was slightly hurt during the emergency landing. After the landing on Monday morning, the airline has arranged another flight to take the passengers to Lhasa. (Xinhua/Wan Bi) (ry) (Photo by Xinhua/Sipa USA)
Xinhua/Sipa USA
(180514) -- CHENGDU, May 14, 2018 (Xinhua) -- Flight 3U8633, operated by Sichuan Airlines, prepares to conduct emergency landing after a mechanical failure in Chengdu Shuangliu International Airport in Chengdu, capital of southwest China's Sichuan Province, May 14, 2018. Part of the cockpit window broke as the Airbus A319 flew over Chengdu. The plane was en route from southwest China's Chongqing Municipality to Lhasa, capital of Tibet Autonomous Region. It was forced to divert to an alternate airport in Chengdu. All passengers are safe, although the co-pilot sustained injuries to the face and waist, and another crew member was slightly hurt during the emergency landing. After the landing on Monday morning, the airline has arranged another flight to take the passengers to Lhasa. (Xinhua/Wan Bi) (ry) (Photo by Xinhua/Sipa USA)
Now playing
00:51
Co-pilot sucked halfway out of plane
A JetBlue flight from San Juan to Tampa was diverted when the outer layer of the plane's windshield shattered.
WFTS
A JetBlue flight from San Juan to Tampa was diverted when the outer layer of the plane's windshield shattered.
Now playing
00:42
JetBlue windshield shatters mid-flight
Air Canada
Now playing
01:15
Plane nearly landed on a crowded taxiway
KYW
Now playing
01:32
Southwest plane makes emergency landing
australia bali flight airasia seven network pkg_00013614.jpg
australia bali flight airasia seven network pkg_00013614.jpg
Now playing
01:27
Inside AirAsia flight as it dropped 20,000 feet
Marty Martinez/Storyful
Now playing
01:33
Watch passengers inside Southwest plane
(CNN) —  

Hundreds of planes flying commercially today could be vulnerable to having their onboard computers hacked and remotely taken over by someone using the plane’s passenger Wi-Fi network, or even by someone on the ground, according to a new report from the Government Accountability Office.

One of the authors of the report, Gerald Dillingham, told CNN the planes include the Boeing 787 Dreamliner, the Airbus A350 and A380 aircraft, and all have advanced cockpits that are wired into the same Wi-Fi system used by passengers.

“Modern communications technologies, including IP connectivity, are increasingly used in aircraft systems, creating the possibility that unauthorized individuals might access and compromise aircraft avionics systems,” according to the report, which is based on interviews with cybersecurity and aviation experts.

The government investigators who wrote the report say it is theoretically possible for someone with just a laptop to:

– Commandeer the aircraft

– Put a virus into flight control computers

– Jeopardize the safety of the flight by taking control of computers

– Take over the warning systems or even navigation systems

Dillingham says although modern aircraft could be vulnerable, there are a number of redundancy mechanisms built into the plane systems that could allow a pilot to correct a problem.​

The report explains that as the air traffic control system is upgraded to use Internet-based technology on both the ground and in planes, avionics could be compromised. Older planes systems aren’t highly Internet-based, so the risk for aircraft 20 years and older is less.​

The GAO report does not draw a roadmap on how this could be done, but it does say someone would have to bypass the firewall that separates the Wi-Fi from the rest of the plane’s electronics. GAO Investigators say they spoke with four cybersecurity experts about the firewall vulnerabilities, “and all four said that because firewalls are software components, they could be hacked like any other software and circumvented.”

Commercial pilot John Barton told CNN, “We’ve had hackers get into the Pentagon, so getting into an airplane computer system I would think is probably quite easy at this point.”

The report continues, “According to cybersecurity experts we interviewed, Internet connectivity in the cabin should be considered a direct link between the aircraft and the outside world, which includes potential malicious actors.”

“A virus or malware planted in websites visited by passengers could provide an opportunity for a malicious attacker to access the IP-connected onboard information system through their infected machines,” according to the report.

It says another way a hacker could get access to a plane’s computers is through a physical connection and notes that whenever there is a physical linkage, such as a USB plug in a passenger seat, if those wires are linked in any way to the airplane’s avionics, that linkage creates a vulnerability.

Experts told investigators, “If the cabin systems connect to the cockpit avionics systems and use the same networking platform, in this case IP, a user could subvert the firewall and access the cockpit avionics system from the cabin.”

Members of the House Transportation and Infrastructure Committee, along with senators on the Commerce Committee, requested the report. Rep. Peter DeFazio, D-Oregon, who is the ranking member of the House committee, tells CNN, “This report exposed a real and serious threat – cyberattacks on an aircraft in flight.”

He says that the Federal Aviation Administration “must focus on aircraft certification standards that would prevent a terrorist with a laptop in the cabin or on the ground from taking control of an airplane through the passenger Wi-Fi system. That’s a serious vulnerability.”

The report concludes that the FAA needs to work on certification of aircraft avionics that will account for these vulnerabilities and remove them as possible threats to commercial aviation.

A source briefed on the report tells CNN that cybersecurity experts say these vulnerabilities exist and these scenarios are possible. But it is unclear how far the GAO went to test any of these possible scenarios. In the report, the GAO does not say whether this is based on actual testing or just theoretical mockups.

Pilot Barton notes, “This is going to take a long time, vetted by the best experts in the world and safety people to make this technology secure and safe.”

In a letter to the GAO, Keith Washington, acting assistant secretary for administration with the FAA, said the agency “recognizes that cyberbased threats to federal information systems are becoming a more significant risk and are rapidly evolving and increasingly difficult to detect and defend against. We take this risk very seriously.”

Washington went on to say “It is also important to note that the FAA had already initiated a comprehensive program to improve the cybersecurity defenses of the NAS (National Airspace System) infrastructure, as well as other FAA mission-critical systems. We are significantly increasing our collaboration and coordination with cyber intelligence and security organizations across the federal government and in the private sector.”

“The Dreamliner and the A350 were actually designed to have the technology in it going forward to be able to have remote control intervention between the pilot and the ground or if an emergency were to happen in the air,” Barton said. But he quickly added, “It’s going to take a long time before we get to the point where that technology is safe and secure.”

Boeing said it is committed to designing secure aircraft.

“Boeing airplanes have more than one navigational system available to pilots,” the company said in a statement. “No changes to the flight plans loaded into the airplane systems can take place without pilot review and approval. In addition, other systems, multiple security measures, and flight deck operating procedures help ensure safe and secure airplane operations.”

Airbus released a statement, which read: “Airbus, in partnership with our suppliers, constantly assesses and revisits the system architecture of our products, with an eye to establishing and maintaining the highest standards of safety and security. Beyond that, we don’t discuss design details or safeguards publicly, as such discussion might be counterproductive to security.”