My Authors
Read all threads
#Huawei
Huawei devices were shown to have a high number of known security vulnerabilities. Despite the fact that many of these vulnerabilities have been public knowledge for years, Huawei continues to make firmware updates without addressing them.
#Huawei
On average, Huawei devices had 102 known vulnerabilities inside their firmware, primarily due to the use of vulnerable open-source and third-party components.
#Huawei
Across the firmware tested, there were 8,826 observations of vulnerabilities with a CVSS score of 10.0, the maximum severity level, indicating serious flaws in the systems.
#Huawei
One tested device had a total of 1,419 known vulnerabilities in its most recent version of firmware.
#Huawei
29% of all devices tested had at least one default username and password stored in the firmware, enabling access to the device if administrators don’t change these credentials.
#Huawei
Researchers observed 76 instances of firmware where the device was, by default, configured such that a root user with a hard-coded password could log in over the SSH protocol, providing for default backdoor access.
#Huawei
8 different firmware images were found to have pre-computed authorized_keys hard coded into the firmware, enabling backdoor access to the holder of the private key.
#Huawei
424 different firmware images contained hardcoded private SSH keys, which can enable a man-in-the-middle to manipulate and/or decrypt traffic going to the device.
#Huawei
Despite being a default compiler option, less than half of the binaries encountered used security features such as ASLR, DEP, and StackGuard.
#ASLR
#Huawei
Huawei practices abysmal software configuration mgmt as demonstrated by their use of 79 distinct versions of the OpenSSL library across their most recent firmware releases. In some cases, Huawei used 10-year-old versions of libraries containing dozens of vulnerabilities.
#Huawei
On dozens of occasions, Huawei engineers disguised known unsafe functions (such as memcpy) as the “safe” version (memcpy_s) by creating wrapper functions with the “safe” name but none of the safety checks. This leads to thousands of vulnerable conditions in their code.
#Huawei
Across 356 firmware images, there are several million calls into unsafe functions. Huawei engineers choose the “safe” option of these functions less than 17% of the time, despite the fact that these functions improve security and have existed for over a decade.
#Huawei
On average, each binary analyzed had more than 12 possible buffer overflows, each of which are potential 0-day vulnerabilities.
#Huawei
The Huawei device have substantially more known vulnerabilities and 2-8x more potential 0-day vulnerabilities than the other devices
#Huawei
The Huawei device is the only device that contains hard-coded default credentials and hard-coded default cryptographic keys.
#Huawei
In analysis across different dimensions of risk matrix, a Huawei device had the highest risk in six of the nine categories when ranked against comparable Juniper and Arista devices
#Huawei
In May 2019, Dutch newspaper De Volkskrant reported that Dutch intelligence agency AIVD was made aware of backdoors on Huawei equipment belonging to a Dutch carrier, and that AIVD was determining whether or not those backdoors were used for spying by the Chinese gov.
#Huawei
In Jan 2018, African Union officials told the FT that computer systems installed by Huawei in its HQ had been transferring confidential information daily to servers in China between 2012 and 2017. The data theft was first reported by French newspaper Le Monde Afrique.
#Huawei
Vodafone, Europe’s biggest phone company, identified hidden backdoors in software inside Huawei products that could have given Huawei unauthorized access to the carrier’s fixed-line network in Italy, a system that provides internet service to several of businesses.
#Huawei
In March 2019, various media outlets covered a Huawei driver vulnerability uncovered by Microsoft. Huawei MateBook systems that are running the company’s PC Manager software included a driver that would let unprivileged users create processes with superuser privileges.
#Huawei
In July 2012, Felix Lindner and Gregor Kopf gave a conference presentation at Defcon to announce that they uncovered several critical vulnerabilities in Huawei routers (models AR18 and AR29) which could be used to get remote access to the device.
#Huawei
In March 2019, the Oversight Board of United Kingdom’s government organization Huawei Cyber Security Evaluation Centre (HCSEC) found “serious and systematic defects” in Huawei software engineering and their cybersecurity competence.
#Huawei
HCSEC reported that it has not seen anything to give it confidence in Huawei’s ability to bring about change via its transformation program and will require sustained evidence of better software engineering and cybersecurity quality verified by HCSEC and NCSC.
#Huawei
There are full and partial copies of 79 distinct OpenSSL versions in 3,062 unique files present in Huawei firmware images. The oldest version was released in 1999.
#Huawei
Analysis of relevant source code worryingly identified a number pre-processor directives of the form "#define SAFE_LIBRARY_memcpy(dest, destMax, src, count) memcpy(dest, src, count)", which redefine a safe function to an unsafe one.
Report - assets.publishing.service.gov.uk/government/upl… Image
#Huawei
Researchers identified several high-risk firmware images that contain in excess of 1,400 unique CVEs. The median number of CVEs per firmware analyzed is 102. By all standards, this number is high.
#Huawei
There are 655 unique CVEs that are explicitly reported against Huawei products. This number is based on a search for all CPEs with Huawei as the vendor and includes results for categories not included as part of this report such as mobile phones & home network equipment.
#Huawei
Researchers recovered credentials from several locations on the filesystem including Linux default locations such as /etc/passwd and /etc/shadow and a Huawei-specific configuration file, vrpcfg.cfg.
#Huawei
The sudo configuration allows the huawei user to execute specific commands as a privileged user. The huawei user is able to execute /sbin/ modprobe and /sbin/insmod commands which allow that user to insert code into the kernel process of the running system. Image
#Huawei
Several Huawei CloudEngine Series Switches and
E9000 modules have a logic error in the /etc/
rcS.d/S21dropbear initialization script that keeps
the dropbear SSH RSA and DSS host keys from being dynamically generated.
#Huawei
Only 73.96% of Huawei binaries have DEP (Data Execution Prevention) enabled. This means a
substantial number of devices are vulnerable to the classes of memory corruption attacks DEP is designed to prevent. App. 26.69% of the Huawei binary are protected by StackGuard.
#Huawei
Researchers analyzed the prevalence of DEP, ASLR, RELRO, and StackGuard across all ELF binary files extracted from secure access gateway
products. The results were alarming - 0% of binaries had RELRO and DEP enabled, 25% had ASLR enabled, and 0.3% had StackGuard.
#Huawei
Huawei and Subsidiaries Charged in Racketeering Conspiracy and Conspiracy to Steal Trade Secrets. Charges also Reveal Huawei’s Business in North Korea and Assistance to the Government of Iran in Performing Domestic Surveillance.
justice.gov/opa/pr/chinese…
#Huawei Indictment - Case 1:18-cr-00457-AMD Document 126 Filed 02/13/20
[PDF] justice.gov/opa/press-rele…
#Huawei
Huawei's half-arsed router patching left kit open to botnets: Chinese giant was warned years ago – then bungled it.
ISP alerted biz to UPnP flaw in 2013. Years later, same flaw kept cropping up.
theregister.co.uk/2019/03/28/hua…
#Huawei
2012 - Investigative Report on the U.S. National Security Issues Posed by Chinese Telecommunications Companies Huawei and ZTE
[PDF] stanford.io/2SFVyrA
#Huawei
2018 - Adverse report by National Cyber and Information Security Agency - Czechia
[PDF] govcert.cz/download/kii-v…
#Huawei
2012 - Hackers Reveal Critical Vulnerabilities in Huawei Routers at Defcon - Researchers pointed out that there are over 10,000 calls in the firmware's code to sprintf, a function that's known to be insecure.
pcworld.com/article/260060…
#Huawei
Huawei employees assisted Ugandan and Zambian intelligence agencies in operations against political dissidents.
wsj.com/articles/huawe…
#Huawei
Huawei employees say, they have easy access to clients’ servers & customers’ data. While the employees indicated that there are internal limits on access to this information, they confirmed that the Chinese state “can use” & “wants to use” Huawei.
latimes.com/projects/la-fi…
#Huawei Affliate #HiSilicon
China DVR/NVR Backdoor Discovered - HiSilicon has a long track record of implementing backdoor access on their devices.
habr.com/en/post/486856/
#Huawei
July 2019 - Swascan researchers revealed that they have discovered multiple vulnerabilities in Huawei’s Web Application and Servers.
1. Improper Restriction on Memory Buffer
2. Out-of-bounds Read
3. OS Command Injection
swascan.com/huawei-2/
#Huawei Original tweet from @rtehrani
Senior Huawei Official Acknowledges Ability to Clandestinely Access Mobile Networks
lawfareblog.com/senior-huawei-…
@rtehrani #Huawei
Sept. 2019 - Huawei Users At Risk As U.S. Blacklist Cuts Access To Shared Data On New Cyber Threats
wsj.com/articles/huawe…
@rtehrani #Huawei
Researchers studied 25,000 leaked Huawei resumes and found troubling links to the government and spies.
A research paper by Christopher Balding Associate Professor Fulbright University Vietnam.
[PDF]
1. papers.ssrn.com/sol3/Delivery.…
Or
2. papers.ssrn.com/sol3/papers.cf…
@rtehrani #Huawei
Mercator Institute for China Studies (Merics), an independent think-tank based in Berlin, says there is no reason to think the West can cooperate with China in a trustworthy manner when it comes to critical infrastructure.
[PDF]
merics.org/sites/default/…
@rtehrani #Huawei
Huawei Risk is China Risk - The primary risk involved in doing business with Huawei is that
they operate under the jurisdiction of an authoritarian Chinese gov that has an abysmal track record in the cyber domain.
[PDF]
rwradvisory.com/wp-content/upl…
@rtehrani #Huawei
FCC's case against Huawei
Protecting Against National Security Threats to the Communications Supply Chain Through #FCC Programs

federalregister.gov/documents/2020…
@rtehrani #Huawei
Chinese Economic Espionage Threat - Chinese government is taking an all-tools and all-sectors approach—and that demands our own all-tools and all-sectors approach in response.
fbi.gov/news/speeches/…
@rtehrani #Huawei
Judge Dismisses Huawei Suit Challenging Federal Ban under NDAA

Order copy 👇
bloomberglaw.com/public/desktop…
@rtehrani #Huawei
Huawei shut out from scheme to see how #5G can link communities

Huawei has been banned from participating in a £65m government scheme to explore how next-generation 5G technology can drive businesses and connect communities across the UK.

theguardian.com/technology/202…
@rtehrani #Huawei
Huawei is a key player in Beijing’s anti-Muslim, Big Brother horrors.

What is happening to Uyghur people and others in Xinjiang is state-sponsored terror on an epic scale. And, Huawei is the technological “partner” to these crimes.

nypost.com/2020/02/19/hua…
@rtehrani #Huawei
Huawei’s Role in the ‘Chinese Espionage Enterprise’

Katrina Trinko interviewed Klon Kitchen, a senior research fellow at The Heritage Foundation.

[TRANSCRIPT]

dailysignal.com/2020/02/19/hua…
@rtehrani #Huawei
Vodafone to chop Huawei equipment from core of its European wireless network

Group CEO Nick Read said the company will phase Huawei gear out of its existing core network across Europe over the next five years at a cost of about US$220 million.

itworldcanada.com/article/vodafo…
@rtehrani #Huawei
A bipartisan group of U.S. senators, alarmed by the rise of Chinese electronics supplier Huawei introduced 'Utilizing Strategic Allied Telecommunications Act' to provide more than $1.2 bn toward the development of U.S.-based 5G technologies.

warner.senate.gov/public/_cache/…
@rtehrani #Huawei
Did Huawei bring down #Nortel?

Corporate espionage and theft.

Security advisor Brian Shields discovered that the hackers were vacuuming an alarming volume of sensitive material out of its databases. Chinese links were uncovered.

msn.com/en-ca/news/can…
Missing some Tweet in this thread? You can try to force a refresh.

Enjoying this thread?

Keep Current with Apsis Inc (David)

Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

Twitter may remove this content at anytime, convert it as a PDF, save and print for later use!

Try unrolling a thread yourself!

how to unroll video

1) Follow Thread Reader App on Twitter so you can easily mention us!

2) Go to a Twitter thread (series of Tweets by the same owner) and mention us with a keyword "unroll" @threadreaderapp unroll

You can practice here first or read more on our help page!

Follow Us on Twitter!

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just three indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3.00/month or $30.00/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!