Huawei acknowledges security vulnerability in router
January 4, 2017
Huawei has confirmed that a security vulnerability exists in its HG532 router that could let an attacker send malicious packets to launch an attack. This could lead to the remote execution of arbitrary code.
The Chinese technology company has advised users to take the following measures to protect the device:
- Configure the built-in firewall function;
- Change the default password; and
- Deploy a firewall at the carrier site.
Users can deploy Huawei’s NGFW firewall or data centre firewalls, and upgrade the IPS signature database to the latest version IPS_H20011000_2017120100 released last month to detect and defend against this vulnerability, which can be initiated from the internet.
Huawei says it has established a lifecycle management system and clarified the product lifecycle policy and product termination policy, and has been implementing lifecycle management in accordance with industry practices.
For non-end of service products, Huawei has communicated with customers and provided fix versions based on customers' opinions. For end-of-service products, Huawei has advised customers to take temporary fixes to circumvent or prevent vulnerability or replace old Huawei routers with later versions.
The company says the investigation is still on-going. It was alerted to the problem by Check Point Software Technologies’ research department, which released a security advisory CPAI-2017-1016 but without detailed vulnerability information publicly.
A statement from Check Point said: “As soon as our analysts had confirmed the findings, we disclosed the vulnerability to Huawei discretely so as to mitigate further propagation. Thanks to the fast and effective communication by the Huawei security team, they were able to quickly patch the vulnerability and update their customers.”