According to the Dutch news site Tweakers, the Taiwan-based networking equipment manufacturer D-Link accidently published its private code signing keys inside its open source firmware packages.
One of the readers of the Dutch news site reported, “bartvbl,” reported the serious issues after he had bought a D-Link DCS-5020L security camera and downloaded the firmware from the official website of D-Link.
D-Link open sources its firmware under the GPL license allowing anyone to analyze it. bartvbl has discovered four different private keys used for code signing.
The reader also discovered other three private code signing keys that appear to be not valid and pass-phrases needed to sign the software.
The disconcerting discovery was confirmed by the security expert Yonathan Klijnsma from security firm Fox-IT.
“The code signing certificate is indeed a firmware package, firmware version 1.00b03, who’s source was released February 27 this year,” explained the expert.
Why the access to the code signing keys is so important?
Malware creators use to steal valid code signing certificates to sign the source code of their malware and evade detection of security firms.
At the time I was writing, it is still unclear whether the code signing private keys have been used by threat actors to sign their malicious code signing certificate, and released a new version of the firmware that doesn’t contain any code signing keys.
(Security Affairs – code signing keys, D-Link)
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.