Vulnerabilities / Threats
9/6/2016
05:15 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Cryptographic Key Reuse Remains Widespread In Embedded Products

Nine months after SEC Consult warned about the reuse of private keys and certificates in routers, modems, other products, problem has grown worse.

Nine months after application security services provider SEC Consult warned about widespread reuse of cryptographic credentials in embedded products like Internet routers, gateways and modems, the problem only appears to have gotten worse, not better.

In an alert this week, SEC Consult said the number of web devices with known private keys for HTTPS server certificates has shot up 40 percent from last November when the company first warned about the issue. From 3.2 million devices in November 2015, the number of IPv4 hosts using a known private key now stands at 4.7 million currently.

Along with its alert, SEC Consult this week also released on GitHub a total of 331 HTTPS server certificates along with their matching private keys, that are available to anyone via an Internet scan. The security firm also released a list of products using the publicly available certificates and keys.

The data gives researchers an opportunity to verify SEC Consult’s conclusions and find for themselves more cases of cryptographic key reuse and keys that are attributable to specific products and vendors.

“Releasing the private keys is not something we take lightly as it allows global adversaries to exploit this vulnerability class on a large scale,” SEC Consult said in its alert. “However we think that any determined attacker can repeat our research and get the private keys from publicly available firmware with ease.”

The security implications of cryptographic key reuse is substantial, says Johannes Greil, head of SEC Consult’s vulnerability lab, in comments to Dark Reading. Devices using cryptographic keys that are known publicly, are susceptible to man-in-the-middle attacks including those where an attacker can alter allegedly secure connections without any one noticing.

The big problem here is that vendors of embedded products often leave hardcoded SSH keys and HTTPS server certificates in their devices so as to enable web access to the devices and for use by other protocols such as EAP/802.1X or FTPS, he says.

But since these keys and certificates are the same across multiple products, they are relatively easy to exploit, Greil says.

SEC Consult’s alert follows one from last November when it first drew attention to the problem of widespread certificate and key reuse on the Internet.

In its initial study, SEC Consult analyzed the firmware on more than 4,000 embedded devices from over 70 vendors. The company examined the use of cryptographic public keys, private keys, and certificates in the firmware images of products like routers, modems, and IP cameras and found more than 580 unique private keys distributed across the devices.

The company correlated the data with data from Internet-wide scans using Scans.io and Censys.io and found that about 150 server certificates from its data set were being used by about 3.2 million hosts and another 80 SSH host keys used by nearly 1 million hosts.

Some keys were found in one product or several products in the same product line. In other cases, SEC Consult found the same keys being used in products from multiple vendors, likely as the result of the keys being shared, leaked or even stolen or because the same product was being sold to different brands.

SEC Consult says it has worked with CERT/CC to notify affected device vendors, ISPs and chipset makers of the issue since August 2015.

The fact that the problem remains widespread despite this outreach shows how difficult it is to get vendors to patch their systems. “It's an industry-wide problem. Many vendors are lazy in regards to providing patches for their devices, [which] once sold, [are] never taken care of anymore, he said. “If there are no industry-wide changes and regulations by law, the problem might never go away.”

Related stories:

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
lorraine89
50%
50%
lorraine89,
User Rank: Ninja
10/10/2016 | 7:21:51 AM
Cyber security
Though encryption is one of the most important data security tool out there at the moment and lies in the category of cryptography but one can not ignore the importance of vpn servers as well. I have been using purevpn server for the past few years and have been thoroughly satisfied with its working as it protects my incoming and outgoing traffic. 
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Security Technologies to Watch in 2017
Emerging tools and services promise to make a difference this year. Are they on your company's list?
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.