Breaking News

ENDORFY introduces Atlas Electric desks Sony Unveils LinkBuds Clip Open Earbuds be quiet! enters high-end gaming mouse market with Dark Perk Ergo and Dark Perk Sym ASUS ROG announces ROG Strix GS-BE7200 Dual-Band WiFi 7 Gaming Router Transcend Launches RDE3 microSD Express Card Reader for Next-Generation High-Speed Performance

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

Study Says HTTPS Certificate and SSH Key Reuse Endangers Millions of Devices Worldwide

Study Says HTTPS Certificate and SSH Key Reuse Endangers Millions of Devices Worldwide

Enterprise & IT Nov 26,2015 0

A recent study analyzed the firmware images of more than 4000 embedded devices -- Internet gateways, routers, modems, IP cameras, VoIP phones, etc - and discovered that they share the same hard-coded SSH (Secure Shell) host keys or HTTPS (HTTP Secure) server certificates. By extracting those keys, hackers can potentially launch man-in-the-middle attacks to intercept and decrypt traffic between users and millions of devices.

Researchers from security firm SEC Consult analyzed cryptographic keys (public keys, private keys, certificates) in firmware images. The most common use of these static keys is SSH Host keys (keys required for operating a SSH server) and X.509 Certificates used for HTTPS (default server certificate for web based management).

In total, the analysis found more than 580 unique private keys distributed over all the analysed devices. When correlating those keys with data from public Internet scans, the researchers found that at least 230 keys are actively used by over 4 million Internet-connected devices. Around 150 of the HTTPS server certificates they recovered are used by 3.2 million devices and 80 of the SSH host keys are used by 900,000 devices.

SSH Host keys have been embedded, essentially "baked in" the firmware image (operating system) of devices and are mostly used for providing HTTPS and SSH access to the device. This is a problem because all devices that use the firmware use the exact same keys.

Some keys were only found in one product or several products in the same product line. In other cases the sresearchers found the same keys in products from various different vendors.

If an attacker steals the device's SSH host private key and is in a position to intercept the user's connection attempts, he can impersonate the device and trick the user's computer to talk to his machine instead.

A similar attack is possible if attackers gain access to a device's HTTPS private certificate, which is used to encrypt communications between users and its Web-based management interface.

The researchers suggest vendors make sure that each device uses random, unique cryptographic keys. In the case of CPE devices, both the ISP and the vendor have to work together to provide fixed firmware for affected devices.

Furthermore ISPs have to make sure remote access via the WAN port to CPEs is not possible. In case the ISP needs access for remote support purposes, setting up a dedicated management VLAN with strict ACLs (no CPE to CPE communication) is recommended.

End users should change the SSH host keys and X.509 certificates to device-specific ones. This is not always possible as some products do not allow this configuration to be changed or users do not have permissions to do it (frequent in CPE devices). The required technical steps (generating a certificate or RSA/DSA key pair etc.) are not something that can be expected of a regular home user.

Tags:
Previous Post
German ISPs May Block Music-sharing Sites: court
Next Post
SK Hynix Rejects Chinese Take-over Offer

Related Posts

Latest News

ENDORFY introduces Atlas Electric desks
Gadgets

ENDORFY introduces Atlas Electric desks

Sony Unveils LinkBuds Clip Open Earbuds
Consumer Electronics

Sony Unveils LinkBuds Clip Open Earbuds

be quiet! enters high-end gaming mouse market with Dark Perk Ergo and Dark Perk Sym
Gaming

be quiet! enters high-end gaming mouse market with Dark Perk Ergo and Dark Perk Sym

ASUS ROG announces ROG Strix GS-BE7200 Dual-Band WiFi 7 Gaming Router
Enterprise & IT

ASUS ROG announces ROG Strix GS-BE7200 Dual-Band WiFi 7 Gaming Router

Transcend Launches RDE3 microSD Express Card Reader for Next-Generation High-Speed Performance
Cameras

Transcend Launches RDE3 microSD Express Card Reader for Next-Generation High-Speed Performance

Popular Reviews

be quiet! Dark Mount Keyboard

be quiet! Dark Mount Keyboard

Terramaster F8-SSD

Terramaster F8-SSD

be quiet! Light Mount Keyboard

be quiet! Light Mount Keyboard

Soundpeats Pop Clip

Soundpeats Pop Clip

Akaso 360 Action camera

Akaso 360 Action camera

Dragon Touch Digital Calendar

Dragon Touch Digital Calendar

be quiet! Pure Loop 3 280mm

be quiet! Pure Loop 3 280mm

Noctua NF-A12x25 G2 fans

Noctua NF-A12x25 G2 fans

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed