Overview
Embedded devices use non-unique X.509 certificates and SSH host keys that can be leveraged in impersonation, man-in-the-middle, or passive decryption attacks.
Description
CWE-321: Use of Hard-coded Cryptographic Key - Multiple CVEs Research by Stefan Viehbཬk of SEC Consult has found that numerous embedded devices accessible on the public Internet use non-unique X.509 certificates and SSH host keys. Products are identified as vulnerable if unpacked firmware images are found to contain hard-coded keys or certificates whose fingerprints can be matched to data from the Internet-wide scan data repository, scans.io (specifically, see SSH results and SSL certificates). Affected devices range broadly from home routers and IP cameras to VOIP phones. |
Impact
A remote, unauthenticated attacker may be able to carry out impersonation, man-in-the-middle, or passive decryption attacks, resulting in sensitive information exposure. |
Solution
In most cases, the CERT/CC is unaware of a practical solution to this problem. Some vendors have indicated that updates or guidance will be provided, and this information will be updated within individual vendor information pages below when known. Users are encouraged to contact device vendors for more information. |
Change X.509 certificates or SSH host keys |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 5 | AV:N/AC:L/Au:N/C:P/I:N/A:N |
Temporal | 4.8 | E:F/RL:U/RC:C |
Environmental | 3.5 | CDP:ND/TD:M/CR:ND/IR:ND/AR:ND |
References
- http://blog.sec-consult.com/2015/11/house-of-keys-industry-wide-https.html
- http://blog.sec-consult.com/2016/09/house-of-keys-9-months-later-40-worse.html
- https://www.sec-consult.com/download/certificates.html
- https://www.sec-consult.com/download/ssh_host_keys.html
- https://scans.io/
- https://scans.io/series/ssh-rsa-full-ipv4
- https://scans.io/study/sonar.ssl
- https://censys.io
Acknowledgements
Thanks to Stefan Viehbཬk of SEC Consult for reporting this vulnerability.
This document was written by Joel Land.
Other Information
CVE IDs: | CVE-2015-6358, CVE-2015-7255, CVE-2015-7256, CVE-2015-7276, CVE-2015-8251, CVE-2015-8260 |
Date Public: | 2015-11-25 |
Date First Published: | 2015-11-25 |
Date Last Updated: | 2016-09-06 16:03 UTC |
Document Revision: | 69 |