Threat Management, Threat Intelligence, Vulnerability Management

Huawei products riddled with backdoors, zero days and critical vulnerabilities

Share

Huawei’s problems keep piling up as a security firm specializing in IoT devices found numerous vulnerabilities across the company’s entire product line.

Finite State said it scanned more than 1.5 million files embedded within nearly 10,000 firmware images supporting 558 products looking for risks including hard-coded backdoor credentials, unsafe use of cryptographic keys, indicators of insecure software development practices, and the presence of known and 0-day vulnerabilities.“The results of the analysis show that Huawei devices quantitatively pose a high risk to their users. In virtually all categories we studied, we found Huawei devices to be less secure than comparable devices from other vendors,” the report said.

The primary finding being 55 percent of the devices had at least one backdoor primarily in the form of hard-coded, default user accounts and passwords along with several types of embedded cryptographic keys. However, Finite State also found on average 102 known vulnerabilities associated with each firmware, many rated critical or high, along with hundreds of potential zero day issues.

One of the reasons the vulnerabilities were included is Huawei’s development process. The study found the company’s engineers did not use secure development practices, in some cases including 20-year-old software libraries instead of the more secure current version.

“Overall, despite Huawei’s claims about prioritizing security, the security of their devices appears to lag behind the rest of the industry. Through analysis of firmware changes over time, this study shows that the security posture of these devices is not improving over time — and in at least one case we observed, it actually decreased,” the report stated.

Some of the other vulnerability findings:

  • 29 percent of all devices tested had at least one default username and password stored in the firmware.
  • 76 instances of firmware where the device was, by default, configured such that a root user with a hard-coded password could log in over the SSH protocol, providing for default backdoor access.
  • Eight different firmware images were found to have pre-computed authorized_keys hard coded into the firmware.
  • 424 different firmware images contained hardcoded private SSH keys

The final review by Finite State was not positive for Huawei.

“Compared to similar devices from other vendors, we quantitatively demonstrate that Huawei has substantially worse security,” the report stated.

There was some good news for Huawei, if not for the U.S. government. U.S. chip manufactures Intel and Micron have found and are using a loophole in the one-month old federal ban on selling parts to Huawei and continue to sell the company components, the New York Times reported. The loophole allows some products made by American firms, in overseas factories to be, exempt from the ban.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds