Huawei has found itself in the news a lot as of late. There's been the falling out of favor with the US government over espionage concerns, and the company's CFO has been detained in Vancouver by Canadian authorities at the request of the Justice Department.
And now things are worse.
Ankit Anubhav, a principal researcher at NewSky Security, noted a massive security problem involving Huawei HG routers in the company's blog. This is a demonstrable fault -- not one simply based on suspicion of the company's motives.
Over the course of 2018, routers have been a specific target for attackers, including CVE-2018-14847 (Mikrotik) and CVE-2014-8361. These are prime example of how these devices can be abused as a stepping stone for cyber attacks.
However, a standard kind of credential stuffing attack is usually based on the "spray-and-pray" technique -- meaning that the actor will attack any reachable device whether it has default credentials or not, while trying determine if those default credentials will allow them to hijack the device.
CVE-2018–7900 simplifies this entire way of doing things. NewSky found that Huawei's router panel will leak this information if one knows what to look for when targeted by an attacker.
NewSky notes: "When someone has a look on the html source code of login page, few variables are declared. One of the variables contain a specific value. By monitoring this specific value, one can come to the conclusion that the device has the default password."
So, by simply looking for the presence of this specific value, the vulnerability can be detected. It is a string that can be scanned for by using a utility like Shodan or ZoomEye.
This give an attacker some important advantages. First, the attacker does not need to directly scan the Internet for finding the vulnerable devices. Such a scan may lead investigators back to them.
Also, there is now no need to attempt a failed login to determine if the device is vulnerable. Attackers using this technique also do not have the likelihood of encountering a generic honeypot, which will not have this flag.
NewSky has not revealed the actual string involved in this potential attack. In the company blog, researchers note: "The exact variable, proof of concept details and images explaining the vulnerability" will not be shared.
This may be due to Huawei trying to rectify the situation. NewSky claims it contacted the company about this particular security problem at the end of September.
In November, Huawei announced that it has provided a fix but is working with carrier operators for complete resolution. It is unclear what exactly that means.
In its announcement, the company noted that "Huawei has finished the investigation and confirmed that Huawei HG product is affected by this vulnerability. Huawei has already provided a version to fix the vulnerability and has contacted the affected carrier."
That's all well and good, but it's been well established over the years that there is no security gained from simply hiding the vulnerability as is now the case.
Some attacker will undoubtedly find the magic string to search for and use it. Fix it, Huawei -- don't just hide it.
- IoT Botnets Shifting to Exploit Vulnerabilities
- 'Novidade' Exploit Changes DNS Settings in Home & Small Business Routers
- UPnProxy Still Infecting Thousands of Home & Small Business Routers
- Unpatched MikroTik Routers Vulnerable to Cryptomining Malware
— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.