0 $
2,500 $
5,000 $
1,400 $
12 DAYS LEFT UNTIL THE END OF SEPTEMBER

Mass Surveillance: Huawei Intentionally Adds Backdoors To Its Processors

Support SouthFront

Mass Surveillance: Huawei Intentionally Adds Backdoors To Its Processors

Click to see full-size image

A subsidiary of the tech giant Huawei has built backdoors in its processor technology and will not remove them, Vladislav Yarmak, who works as a systems architect at Mail.ru Group said.

According to his estimation, millions of devices around the world have the vulnerability.

A backdoor has been detected on HiSilicon processors used in digital recorders, network surveillance cameras, webcams, and more. According to him, this gap is directly related to four vulnerabilities in the chips of this brand, discovered between 2013 and 2017.

As noted by Vladislav Yarmak, he did not inform the company about his find, as he considered it was unable (or unwilling) to close the vulnerability.

In his Habr blog, he said that HiSilicon “throughout all these years could not or did not want to release the necessary corrections for the same backdoor, which, moreover, was intentionally implemented.”

He also told CNews that HiSilicon representatives did not contact him after the publication of the study, and that in public discussions he had not noticed any reaction from the company.

HiSilicon is a subsidiary of the Chinese tech giant Huawei, it was founded in 2004 and is developing processors, including Kirin for mobile devices (smartphones, tablets) and Kunpeng for servers that Huawei manufactures in Russia.

Also, in its range there are Balong communication modems and chips for various electronics. The company does not have its own factories – Taiwanese TSMC is engaged in the production of its products.

You can use the back door in HiSilicon processors by sending a series of specific commands to TCP port 9530 in network devices with chips from this manufacturer.

These commands allow you to activate the Telnet service on the device and connect to the superuser profile using the “root” login and one of six passwords – 123456, jvbzd, hi3518, k1v123, xc3511 or xmhdipc. After that, the user will be given full control over the device.

All six login / password pairs are built directly into the processor firmware and cannot be deleted or changed by the user. TCP port 9527 accepts the same passwords.

the time of publication, the exact number of devices with “leaky” Huawei processors was not known.

Vladislav Yarmak told CNews the following:

“Now other researchers have joined the work and are clarifying this, as well as looking for new features of this firmware. It is likely that only devices with modules from Xiaong Mai, which in turn are based on HiSilicon and are already branded by different manufacturers of end products for the consumer, are vulnerable to firmware. Specifically, this vulnerability clearly does not apply to tablets and smartphones – it is built into software specific for video surveillance devices.”

On the GitHub website, there is a list of devices whose technology had vulnerabilities identified in them, and the list is comprised of more than 80.

Mass Surveillance: Huawei Intentionally Adds Backdoors To Its Processors

Click to see full-size image

As noted by Vladislav Yarmak, there can be a lot of compromised devices around the world. He did not give the exact number, but noted that there could be from several hundred thousand to several million.

Separately, on February 12th, the Wall Street Journal reported that the US accused Huawei of spying through “technological backdoors.”

According to the outlet, US officials said Huawei has had this technology for over a decade.

The US kept this information highly classified until it started sharing it in 2019 with allies like Germany and the UK in a bid to get them to freeze out Huawei equipment from their 5G networks, the report said.

Unnamed US officials claimed that Huawei built equipment allowing it to tap into telecoms using interfaces designed only for law enforcement without alerting the carriers.

“Huawei does not disclose this covert access to its local customers, or the host nation national-security agencies,” a senior US official told the newspaper.

A Huawei spokeswoman denied these allegations:

“US allegations of Huawei using lawful interception are nothing but a smokescreen — they don’t adhere to any form of accepted logic in the cyber security domain. Huawei has never and will never covertly access telecom networks, nor do we have the capability to do so,” she said.

“Huawei is only an equipment supplier. In this role, accessing customer networks without their authorization and visibility would be impossible. We do not have the ability to bypass carriers, access control, and take data from their networks without being detected by all normal firewalls or security systems. In fact, even The Wall Street Journal admits that US officials are unable to provide any concrete details concerning these so-called ‘backdoors.'” the spokeswoman added.

In turn, Huawei had its own counter-accusations of the US, saying it was hypocritical of it to make any such claims.

“As evidenced by the Snowden leaks, the United States has been covertly accessing telecom networks worldwide, spying on other countries for quite some time. The report by the Washington Post this week about how the CIA used an encryption company to spy on other countries for decades is yet additional proof,” the spokeswoman said, and she mentioned that the Wall Street Journal showed “bias” in its reporting toward the Chinese tech giant.

MORE ON THE TOPIC:

Support SouthFront

SouthFront

Subscribe
Notify of
guest
13 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
igybundy

So someone can use a default login to surveillance cameras.. Similar to your access to routers and such as well.. But first you need access to the network on which the devices operate.. Older devices had default passwords and in some could not be changed. But they want firmware fixes for decades old devices??? Why dont they talk about current devices? Buggy firmware like this was common long ago. It was mostly used for testing.

goingbrokes

Microsoft also has backdoors on their processors, only the media is not allowed to talk about it because they are made in israel now.

Bru

Yes, but the leading company whose processors are designed in Israel with intentional backdoors for the Mossad is Intel, not Microsoft ( the latter only develop software running on Intel’s Israeli- designed processors).

jm74

US was caught spying on Merkel through her mobile phone. All states spy one way or another on other states, no big deal. The secret is what information one wishes to release to the spying state, false, partly false,misleading or true.

Jan Lavicka

When does that uSSSSSSa it never minds, even millions of murdered by the uSSSSS militants in the latest decades does not matter but everyone else is evil when doing hardly 1% of what uSSSSSSSSSS does :)

Ross

Does your computer have an Intel cpu? Most of them do. You might want to learn about the Intel Management Engine .

From the linked article

…this is a parallel operating system running on an isolated chip, but with access to your PC’s hardware. It runs when your computer is asleep, while it’s booting up, and while your operating system is running. It has full access to your system hardware, including your system memory, the contents of your display, keyboard input, and even the network

Fortunately, as this is Intel, it is the Israeli government which knows everything you do on your computer, and they’re our friends, right?

Bobby Twoshoes

“It runs when your computer is asleep, while it’s booting up, and while your operating system is running” It’s even worse than that, the CPU doesn’t even need to be on, as long as the power supply is plugged in at the wall the chip has access to BIOS and even LAN.

Harry Smith

How would Israeli govt and other “forces of good” access your computer if you will turn the internet connection off?

Assad must stay

Thats why I’m only buying amd from now on

Samuel Vanguard

Huawei serves CCP. It does not serve the consumer or anybody with no link to Tyrant Chinese government.

Harry Smith

Yes! That’s why we have to use Cisco. Everyone knows that Western democracies never ever violated the privacy of innocent people!

hvaiallverden

Well, I know one thing, that all the time, whatever I do, where ever I go, and whatever I watch or write is been copyed, from my net suplyer to whever site I enter, and my browser etc to the chips it self, always, and if I ever runned an “org”, I would pesonaly beat the living daylight out of anyone whom uses their phones or the net to comunicate, it dont matter, they all have it, and most of the CPUs are produced in ISISrael, and then we have to what extent can China use that particulare intellegence beats me, but when everything, from the door bell, CCTVs, cars, witch isnt new, they all have had and stil have black boxes for at least 3 decades, and they dont need GPS to monitore you, the road boxes witch they claim is to messure traffic is the old system, to the new one about road tax stations, to surveliance of you baby equimpents, is wide upen the Yankikes whines about China.

Back doors, well, I an not an naive idiot, I know we are all under the tumbs, everything you do is stored, and its just the way it is but the main perpetratore is the Imperial banana republic. And then we have where do this news come from, after the sudden uh… revelation about the Swiss chees corp whom have been on the news lately, know we know why, plausable deniability, again, any Gov spies, its just about been conscious about what you do, and thats it. And above all, I never ever trust AmeriTard news sites, it dont even matter what, apart from the weather or the latest silicon injection any of this mindless “infulenser” are doing, witch is completely irrelevant. Since everything else is nonsense, period.

peace

Harry Smith

Did anybody read the habr article until the end? Let me quote the sentence from the end.

Other researchers and habr users had pointed out such vulnerability is restricted to devices based on Xiongmai (Hangzhou Xiongmai Technology Co, XMtech) software, including products of other vendors which ship products based on such software. At this moment HiSilicon can’t be held responsible for backdoor in dvrHelper/macGuarder binary.

13
0
Would love your thoughts, please comment.x
()
x