Networking vendor Huawei Technologies is under fire because security researchers say its routers are easily hacked. What's your take? Is there legitimate cause for concern with the security of Huawei enterprise networking equipment?
Ask the Expert!
Have questions about network security for expert Matt Pascucci? Send them via email today! (All questions are anonymous.)
You ask if there is cause for concern with Huawei router security, and, as of right now, there doesn't seem to be anything tangible. The apple doesn't fall far from the tree, however. If vulnerabilities were able to pass through the QA process of the models in question, there's a reasonable chance that there are vulnerabilities in the enterprise network equipment that haven't been discovered.
Here are a few things to look for concerning the security of Huawei routers, should you have any on your network:
- Determine what the vulnerability is and if the vendor is putting out a patch that will remediate this issue. As of now, while writing this article, there was no valid patch for the vulnerabilities found. I'd see if there are any updates that you can subscribe to in order to keep updated on the status of the issue.
- Call your rep at Huawei Technologies, get an idea of what's going on and demand an update. This might help with getting a time frame for a patch/upgrade and what can be done now about the vulnerability.
- Keep logging or start logging your company's network. Log everything from these devices and determine if someone's trying to exploit them. If you don't have a patch or a time frame for a patch, you need to proactively monitor these routers much closer. Now that the vulnerability is out there, criminals will start scanning networks in search of these devices. If you see them, block them promptly.
- Lastly, if there isn't a good response from Huawei on how to handle the issue or a patch to fix the vulnerability, it might be time to search for a new vendor. This might sound brash, but your network's security is too important to leave unprotected.
Dig Deeper on Network device security: Appliances, firewalls and switches
Related Q&A from Matthew Pascucci
Understanding the differences between sandboxes vs. containers for security can help companies determine which best suits their particular use cases. Continue Reading
Troubleshooting VPN session timeout and lockout issues should focus first on isolating where the root of the problem lies -- be it the internet ... Continue Reading
What sets web roles and worker roles apart in Microsoft's Azure Cloud Services? Here's a look at how they are different. Continue Reading