According to the Dutch news site Tweakers, the Taiwan-based networking equipment manufacturer D-Link accidently published its private code signing keys inside its open source firmware packages.
One of the readers of the Dutch news site reported, “bartvbl,” reported the serious issues after he had bought a D-Link DCS-5020L security camera and downloaded the firmware from the official website of D-Link.
D-Link open sources its firmware under the GPL license allowing anyone to analyze it. bartvbl has discovered four different private keys used for code signing.
The reader also discovered other three private code signing keys that appear to be not valid and pass-phrases needed to sign the software.
The disconcerting discovery was confirmed by the security expert Yonathan Klijnsma from security firm Fox-IT.
“The code signing certificate is indeed a firmware package, firmware version 1.00b03, who’s source was released February 27 this year,” explained the expert.
Why the access to the code signing keys is so important?
Malware creators use to steal valid code signing certificates to sign the source code of their malware and evade detection of security firms.
At the time I was writing, it is still unclear whether the code signing private keys have been used by threat actors to sign their malicious code signing certificate, and released a new version of the firmware that doesn’t contain any code signing keys.
(Security Affairs – code signing keys, D-Link)
Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…
A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…
A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…
Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…
Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…
This website uses cookies.