Breaking News

ENDORFY Palm Rest V2 series delivers comfort with a magnetic pull MSI’s Latest AMD X870E MAX & EVO Series Motherboards KIOXIA unleashes EXCERIA PRO G2 SSD series KINGMAX Launches DDR5 Horizon II Overclocking Memory Module, Tailored for High-Load Scenarios DeepCool Unveils SPARTACUS 360 AIO Liquid Cooler for High-End Performance and Customization

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

Study Says HTTPS Certificate and SSH Key Reuse Endangers Millions of Devices Worldwide

Study Says HTTPS Certificate and SSH Key Reuse Endangers Millions of Devices Worldwide

Enterprise & IT Nov 26,2015 0

A recent study analyzed the firmware images of more than 4000 embedded devices -- Internet gateways, routers, modems, IP cameras, VoIP phones, etc - and discovered that they share the same hard-coded SSH (Secure Shell) host keys or HTTPS (HTTP Secure) server certificates. By extracting those keys, hackers can potentially launch man-in-the-middle attacks to intercept and decrypt traffic between users and millions of devices.

Researchers from security firm SEC Consult analyzed cryptographic keys (public keys, private keys, certificates) in firmware images. The most common use of these static keys is SSH Host keys (keys required for operating a SSH server) and X.509 Certificates used for HTTPS (default server certificate for web based management).

In total, the analysis found more than 580 unique private keys distributed over all the analysed devices. When correlating those keys with data from public Internet scans, the researchers found that at least 230 keys are actively used by over 4 million Internet-connected devices. Around 150 of the HTTPS server certificates they recovered are used by 3.2 million devices and 80 of the SSH host keys are used by 900,000 devices.

SSH Host keys have been embedded, essentially "baked in" the firmware image (operating system) of devices and are mostly used for providing HTTPS and SSH access to the device. This is a problem because all devices that use the firmware use the exact same keys.

Some keys were only found in one product or several products in the same product line. In other cases the sresearchers found the same keys in products from various different vendors.

If an attacker steals the device's SSH host private key and is in a position to intercept the user's connection attempts, he can impersonate the device and trick the user's computer to talk to his machine instead.

A similar attack is possible if attackers gain access to a device's HTTPS private certificate, which is used to encrypt communications between users and its Web-based management interface.

The researchers suggest vendors make sure that each device uses random, unique cryptographic keys. In the case of CPE devices, both the ISP and the vendor have to work together to provide fixed firmware for affected devices.

Furthermore ISPs have to make sure remote access via the WAN port to CPEs is not possible. In case the ISP needs access for remote support purposes, setting up a dedicated management VLAN with strict ACLs (no CPE to CPE communication) is recommended.

End users should change the SSH host keys and X.509 certificates to device-specific ones. This is not always possible as some products do not allow this configuration to be changed or users do not have permissions to do it (frequent in CPE devices). The required technical steps (generating a certificate or RSA/DSA key pair etc.) are not something that can be expected of a regular home user.

Tags:
Previous Post
German ISPs May Block Music-sharing Sites: court
Next Post
SK Hynix Rejects Chinese Take-over Offer

Related Posts

Latest News

ENDORFY Palm Rest V2 series delivers comfort with a magnetic pull
Consumer Electronics

ENDORFY Palm Rest V2 series delivers comfort with a magnetic pull

MSI’s Latest AMD X870E MAX & EVO Series Motherboards
PC components

MSI’s Latest AMD X870E MAX & EVO Series Motherboards

KIOXIA unleashes EXCERIA PRO G2 SSD series
PC components

KIOXIA unleashes EXCERIA PRO G2 SSD series

KINGMAX Launches DDR5 Horizon II Overclocking Memory Module, Tailored for High-Load Scenarios
PC components

KINGMAX Launches DDR5 Horizon II Overclocking Memory Module, Tailored for High-Load Scenarios

DeepCool Unveils SPARTACUS 360 AIO Liquid Cooler for High-End Performance and Customization
Cooling Systems

DeepCool Unveils SPARTACUS 360 AIO Liquid Cooler for High-End Performance and Customization

Popular Reviews

be quiet! Dark Mount Keyboard

be quiet! Dark Mount Keyboard

Terramaster F8-SSD

Terramaster F8-SSD

be quiet! Light Mount Keyboard

be quiet! Light Mount Keyboard

Soundpeats Pop Clip

Soundpeats Pop Clip

Akaso 360 Action camera

Akaso 360 Action camera

Dragon Touch Digital Calendar

Dragon Touch Digital Calendar

Noctua NF-A12x25 G2 fans

Noctua NF-A12x25 G2 fans

be quiet! Pure Loop 3 280mm

be quiet! Pure Loop 3 280mm

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed