9% of all https hosts and 6% of all ssh hosts on the web use hardcoded private keys embedded in firmware

9% of all https hosts and 6% of all ssh hosts on the web use hardcoded private keys embedded in firmware: In the course of an internal research project SEC Consult labs have analyzed the firmware images of more than 4000 embedded devices of over 70 vendors. The devices they have looked at include Internet gateways, routers, modems, IP cameras, VoIP phones, etc. They have specifically analyzed cryptographic keys (public keys, private keys, certificates) in firmware images.

https://www.sec-consult.com/download/certificates.html

https://www.sec-consult.com/download/ssh_host_keys.html

The most common use of these static keys is:

As we may read on SEC Consult blog: In total we have found more than 580 unique private keys distributed over all the analysed devices. Correlation via the modulus allows us to find matching certificates.

We have correlated our data with data from Internet-wide scans (Scans.io and Censys.io) and found that our data set (580 unique keys) contains:

So in total at least 230 out of 580 keys are actively used. Other research has pointed out the extent of this problem (Heninger, Nadia, et al. “Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices”, Durumeric, Zakir, et al. “Analysis of the HTTPS certificate ecosystem”). However using our approach, an attribution at a vendor/product level is now possible. Plus the private keys have now been obtained.