December 3, 2015 By Douglas Bonderud 2 min read

Sharing is a positive force. Parents teach it to children, managers teach it to staff and new technology initiatives depend on it; public cloud computing wouldn’t be possible without the ability to share and redistribute resources on demand. But as reported by Threatpost, sometimes sharing can also do more harm than good: Researchers have now discovered that thousands of embedded devices — routers, gateways and modems, to name a few — share cryptographic keys, opening up a new avenue for man-in-the-middle (MitM) attacks.

Share and Share Alike?

In a study of more than 4,000 devices from 70 manufacturers, researchers from SEC Consult discovered startling consistency: Almost 600 unique private keys were shared and reused across devices. Of the 580 shared, 230 were actively in use, accounting for 9 percent of HTTPS hosts (150 certificates shared among 3.2 million hosts) and 6 percent of secure shell (SSH) hosts. In total, over 900 products from 50 vendors were identified as vulnerable.

What’s more, while devices made by the same company were shown to reuse private keys, those same keys were also found in devices made by competitors — meaning keys were either deliberately shared, leaked or simply repurposed by OEMs working with different vendors. Since these keys are hard-coded into firmware, it’s not simply a matter of resetting the device and trying again; this state of affairs is effectively permanent.

So what’s the problem here? According to InfoWorld, if attackers can steal private keys and then intercept a connection attempt, they can co-opt the user’s public key and force embedded devices to talk with their machines instead. And since SSH sign-ons typically occur only during the first-ever login attempt, cybercriminals could set themselves up as the go-to connection. By capturing encrypted HTTPS traffic and then applying the right private key, it’s possible for malicious actors to extract usernames, passwords and other forms of authentication.

Sharing these keys makes the problem much worse — attackers have a much higher chance of successfully repurposing keys from one device to grant access on another. While companies have been quick to release warnings and advisories, there’s no quick fix here, although they rightly point out that it would require direct network access for attackers to launch a MitM attack on these embedded devices. The SEC researchers recommended that vendors change default cryptographic keys before hard-coding their firmware in addition to turning off any remote access features on their network.

Perception and Reality of Embedded Devices

So how did it come to this? How did vendors allow their devices to use and reuse keys without a thought to the potential consequences? A recent CNBC article offered some clarity: When asked, 36 percent of consumers admitted they had shared the password to their online banking account, yet most users gave themselves an A for following cybersecurity best practices.

In other words, there’s a disconnect between perception and reality. Cybersecurity is somehow viewed as a matter of perspective rather than hard-and-fast rules. For vendors and OEMs, the sentiment seems to be that they were only embedded devices and, given the relatively complex nature of carrying out a MitM attack, sharing secure keys wasn’t really a problem — they still deserve an A for cybersecurity, right?

Attackers are now more than willing to go the extra mile if it gives them unfettered access to corporate networks, especially if companies aren’t actively searching for threats in a specific area. Bottom line? Embedded devices aren’t in a class alone when it comes to IT security. Best practices must be shared across all potential access points.

More from

SoaPy: Stealthy enumeration of Active Directory environments through ADWS

10 min read - Introduction Over time, both targeted and large-scale enumeration of Active Directory (AD) environments have become increasingly detected due to modern defensive solutions. During our internship at X-Force Red this past summer, we noticed FalconForce’s SOAPHound was becoming popular for enumerating Active Directory environments. This tool brought a new perspective to Active Directory enumeration by performing collection via Active Directory Web Services (ADWS) instead of directly through Lightweight Directory Access Protocol (LDAP) as other AD enumeration tools had in the past.…

Smoltalk: RCE in open source agents

26 min read - Big shoutout to Hugging Face and the smolagents team for their cooperation and quick turnaround for a fix! Introduction Recently, I have been working on a side project to automate some pentest reconnaissance with AI agents. Just after I started this project, Hugging Face announced the release of smolagents, a lightweight framework for building AI agents that implements the methodology described in the ReAct paper, emphasizing reasoning through iterative decision-making. Interestingly, smolagents enables agents to reason and act by generating…

4 ways to bring cybersecurity into your community

4 min read - It’s easy to focus on technology when talking about cybersecurity. However, the best prevention measures rely on the education of those who use technology. Organizations training their employees is the first step. But the industry needs to expand the concept of a culture of cybersecurity and take it from where it currently stands as an organizational responsibility to a global perspective.When every person who uses technology — for work, personal use and school — views cybersecurity as their responsibility, it…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today