Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Why Huawei Has Congress Worried
Newest First  |  Oldest First  |  Threaded View
dburgess00
50%
50%
dburgess00,
User Rank: Apprentice
10/10/2012 | 10:07:21 PM
re: Why Huawei Has Congress Worried
The concern here is not design flaws or security shortcomings, but about deliberate back doors. The most dangerous vulnerabilities will not be revealed through testing, but only through a complete tear-down and reverse-engineering of every device. The real answer is for the telecom industry to understand that closed, locked-down, proprietary systems are inherently untrustworthy. Open source is a safer way. http://openbts.blogspot.com
tkomperda606
50%
50%
tkomperda606,
User Rank: Apprentice
10/10/2012 | 3:30:31 AM
re: Why Huawei Has Congress Worried
The U.S. government didn't intervene when the U.S. Telecom Industry was going down the tubes and U.S. Companies like Lucent and Tellabs were losing money and laying thousands of people off. These jobs are gone forever and there are still people from that industry that are out of work. The Chinese moved in and cleaned up what remained (from an economic standpoint)and now we're getting the public all alarmed about a security issue. I'm not saying that there aren't hacking and espionage initiatives to be concerned with (with all of the major powers like China, U.S. Russia, Israel, other parts of Asia, etc.), but this is more so a situation where China is kicking our ass once again from an economic perspective. We continue to give up our leadership positions in various industries and technologies and other countries are more than happy to come in and improve their economic situation to our detriment. Then our politicians proclaim that we need to generate more jobs! Or, that we should be concerned about spies!
Dudeman44
50%
50%
Dudeman44,
User Rank: Apprentice
10/9/2012 | 6:06:57 PM
re: Why Huawei Has Congress Worried
This isn't a financial issue, it's a security concern. So we can't show proof of these two companies spying on others via their Chinese designed and built network devices, do we want to be the first to find out after it's installed? It's too late then.

Example: years ago, the U.S. needed a new embassy built in Moscow, and we trusted local, (then Soviet) contractors to build it. Before it was completed, American teams inspected, it was so riddled with bugs and spy devices built into the floors, walls, ceilings, fixtures, etc., that it had to be torn down and rebuilt by American teams sent over there. Do we want to learn from history, or not? Same exact situation here, only much worse if it ever got deployed nationally. How could anyone be so naive as to think the Chinese government would let a once in a lifetimre opportunity like this to pass by.

In all fairness, if the shoe were on the other foot and Cisco was invited to build out China's or Russia's telecom infrastructure, you can bet the CIA would to exactly the same thing...
greg-imm
50%
50%
greg-imm,
User Rank: Apprentice
10/9/2012 | 1:32:38 PM
re: Why Huawei Has Congress Worried
when will we realize the Chinese are trying to be the financial powerhouse of the world and that we are so greedy we are giving it to them for short term gain? Our corporations are so bent on making the next quarter's goals that they are selling the US out. We are not just giving away our leadership position in the world, we are shoveling it out to them as fast as we can for the almighty buck. When we will look a little past the end of our greedy little noses and start investing in our own country at the expense of the investors.


COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/10/2020
Researcher Finds New Office Macro Attacks for MacOS
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/7/2020
Adaptive Shield Emerges From Stealth
Jai Vijayan, Contributing Writer,  8/13/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: It's a technique known as breaking out of the sandbox kids.
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-20383
PUBLISHED: 2020-08-13
ABBYY network license server in ABBYY FineReader 15 before Release 4 (aka 15.0.112.2130) allows escalation of privileges by local users via manipulations involving files and using symbolic links.
CVE-2020-24348
PUBLISHED: 2020-08-13
njs through 0.4.3, used in NGINX, has an out-of-bounds read in njs_json_stringify_iterator in njs_json.c.
CVE-2020-24349
PUBLISHED: 2020-08-13
njs through 0.4.3, used in NGINX, allows control-flow hijack in njs_value_property in njs_value.c. NOTE: the vendor considers the issue to be "fluff" in the NGINX use case because there is no remote attack surface.
CVE-2020-7360
PUBLISHED: 2020-08-13
An Uncontrolled Search Path Element (CWE-427) vulnerability in SmartControl version 4.3.15 and versions released before April 15, 2020 may allow an authenticated user to escalate privileges by placing a specially crafted DLL file in the search path. This issue was fixed in version 1.0.7, which was r...
CVE-2020-24342
PUBLISHED: 2020-08-13
Lua through 5.4.0 allows a stack redzone cross in luaO_pushvfstring because a protection mechanism wrongly calls luaD_callnoyield twice in a row.