Nine months after SEC Consult warned about the reuse of private keys and certificates in routers, modems, other products, problem has grown worse.

3 Min Read

Nine months after application security services provider SEC Consult warned about widespread reuse of cryptographic credentials in embedded products like Internet routers, gateways and modems, the problem only appears to have gotten worse, not better.

In an alert this week, SEC Consult said the number of web devices with known private keys for HTTPS server certificates has shot up 40 percent from last November when the company first warned about the issue. From 3.2 million devices in November 2015, the number of IPv4 hosts using a known private key now stands at 4.7 million currently.

Along with its alert, SEC Consult this week also released on GitHub a total of 331 HTTPS server certificates along with their matching private keys, that are available to anyone via an Internet scan. The security firm also released a list of products using the publicly available certificates and keys.

The data gives researchers an opportunity to verify SEC Consult’s conclusions and find for themselves more cases of cryptographic key reuse and keys that are attributable to specific products and vendors.

“Releasing the private keys is not something we take lightly as it allows global adversaries to exploit this vulnerability class on a large scale,” SEC Consult said in its alert. “However we think that any determined attacker can repeat our research and get the private keys from publicly available firmware with ease.”

The security implications of cryptographic key reuse is substantial, says Johannes Greil, head of SEC Consult’s vulnerability lab, in comments to Dark Reading. Devices using cryptographic keys that are known publicly, are susceptible to man-in-the-middle attacks including those where an attacker can alter allegedly secure connections without any one noticing.

The big problem here is that vendors of embedded products often leave hardcoded SSH keys and HTTPS server certificates in their devices so as to enable web access to the devices and for use by other protocols such as EAP/802.1X or FTPS, he says.

But since these keys and certificates are the same across multiple products, they are relatively easy to exploit, Greil says.

SEC Consult’s alert follows one from last November when it first drew attention to the problem of widespread certificate and key reuse on the Internet.

In its initial study, SEC Consult analyzed the firmware on more than 4,000 embedded devices from over 70 vendors. The company examined the use of cryptographic public keys, private keys, and certificates in the firmware images of products like routers, modems, and IP cameras and found more than 580 unique private keys distributed across the devices.

The company correlated the data with data from Internet-wide scans using Scans.io and Censys.io and found that about 150 server certificates from its data set were being used by about 3.2 million hosts and another 80 SSH host keys used by nearly 1 million hosts.

Some keys were found in one product or several products in the same product line. In other cases, SEC Consult found the same keys being used in products from multiple vendors, likely as the result of the keys being shared, leaked or even stolen or because the same product was being sold to different brands.

SEC Consult says it has worked with CERT/CC to notify affected device vendors, ISPs and chipset makers of the issue since August 2015.

The fact that the problem remains widespread despite this outreach shows how difficult it is to get vendors to patch their systems. “It's an industry-wide problem. Many vendors are lazy in regards to providing patches for their devices, [which] once sold, [are] never taken care of anymore, he said. “If there are no industry-wide changes and regulations by law, the problem might never go away.”

Related stories:

 

About the Author(s)

Jai Vijayan, Contributing Writer

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year career at Computerworld, Jai also covered a variety of other technology topics, including big data, Hadoop, Internet of Things, e-voting, and data analytics. Prior to Computerworld, Jai covered technology issues for The Economic Times in Bangalore, India. Jai has a Master's degree in Statistics and lives in Naperville, Ill.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights