Wednesday , July 17 2019
Home / mexico / Vodafone found back door in Huawei routers

Vodafone found back door in Huawei routers

According to Bloomberg, Vodafone found a hidden door on Huawei's networking device. These findings occurred in 2011 and were resolved in 2012. Although the rear doors have been closed, they are information that certainly does not help improve the public image of a company based in the Czech Republic. Shenzhen (China).

Vodafone found back door in Huawei routers

According to Vodafone's internal security documents that collect data between 2009 and 2011, the company has identified back-door software hidden to allow access to Huawei's fixed telephone network in Italy, serving millions of customers. Vodafone would ask Huawei remove these back doors in home routers in 2011.


A little later he received confirmation that these security doors were closed, but later tests confirmed that security holes were still present. In addition to routers where Huawei hg556a could be one of the affected Vodafone he also found a back door hidden elsewhere.

In this case it is found in nodes of your optical network and in the gates. These are all key elements in optical signal transport, allowing users to enjoy these maximum connection speeds. No more details of these hidden rear doors were revealed at this time.

As we know, backdoor allows access (backdoor in English) is a sequence within source code with which you can avoid security access to enter the system. On some occasions, developers leave them for maintenance, but if they fall into hands, they shouldn't be to steal personal information (or worse).

Vodafone confirmed that personal data the existence of these security breaches. Huawei has confirmed that they have been resolved as found in 2011 and 2012. The company's official position Huawei just published a few minutes ago:

"We are aware of the vulnerabilities that occurred in 2011 and 2012 that were being addressed at the time." Software bugs are a challenge for the industry. Like all ICT providers, we have a public reporting and repair process in place, and when a vulnerability is identified, we work with our partners manually to take appropriate corrective action. "

Source link