Hackers Bypass Airport Security: How Two Researchers Flew First Class for Free

Cybersecurity researchers found a vulnerability allowing them to skip US airport security and fly in the cockpit, all thanks to a SQL injection bug in the FlyCASS system. Apparently, you don’t need pilot school—just some hacking skills—to enjoy those cockpit views.

Pro Dashboard

Hot Take:

Who knew being a high-flying hacker could be so literal? Forget pilot school; apparently, all you need is a bit of SQL wizardry to snag a cockpit seat. Just don’t forget to pack your parachute, because it’s a long way down for those who get caught!

Key Points:

  • Researchers exploited a vulnerability in the Known Crewmember (KCM) and Cockpit Access Security System (CASS).
  • Smaller airlines using third-party systems were especially vulnerable.
  • A simple SQL injection allowed access to admin privileges on FlyCASS.
  • Authorities’ response was slow and somewhat dismissive initially.
  • FlyCASS was temporarily disconnected from KCM and CASS after the vulnerability was disclosed.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?