back to article AMX backdoors US govt's comms system with Batman-inspired surveillance mode

AMX, which supplies communications kit for the White House, US military, and several of the largest corporations, built a superhero-themed surveillance backdoor into its products. An analysis of the AMX NX-1200 communications controller by researchers at SEC Consult showed the device had a "setUpSubtleUserAccount" function. …

  1. CAPS LOCK

    The gubmint bugged by a backdoor?

    Karma baby!

  2. Anonymous Coward
    Big Brother

    This is just...

    Too good to be true...

    Finally the US get's a taste of it's own medicine...

    1. cbars

      Re: This is just...

      Yea! Amazing!

      What requirements were given to the AMX dev after disclosure?

      "Remove Black Widow username, it's compromised.

      Maintain capabilities required by TLA (We're restricted by gag order so don't tell infosec bods)."

      Dev goes ".....err"

  3. Gene Cash Silver badge

    Nice subtle Batman in the picture...

    1. channel extended

      Also a copy of Scarlett next to the Prez.

  4. Destroy All Monsters Silver badge
    Gimp

    Rape, Rape, Rape, Rape!

    Rape, Rape, Rape, Rape!

    RAPE!!!!

  5. joed

    so who's monitoring that puppet show in the White House?

    1. Pascal Monett Silver badge

      Putin, obviously.

    2. Anonymous Coward
      Anonymous Coward

      Maybe...

      Whoever shot Kennedy?

  6. allthecoolshortnamesweretaken

    Wow, backdoor, and a hard coded password to boot...

    Are the rumours true that Callmedave has already ordered AMX gear for No 10?

  7. Anonymous Coward
    Facepalm

    I'm waiting for the part where the White House complains...

    About the danger of well-intentioned vulnerabilities inserted into communications infrastructure.

    (If irony was gumdrops, I'm about to get diabetic.)

  8. FuzzyTheBear Silver badge

    Backdoor

    Almost all AMX and Crestron controllers like that one are meant to be used primarily hardwired with CrestNet or AMLink. Yes there's local network access cause people like to use their tablets as touch panels.So we install wireless access points. And yes we have backdoors cause clients and previous programmers loose their login credentials . Hardcoded passwords exist in both these brands.

    The controller in question is IR relay and rs-232 primarily , network is also there but as a general rule they are never connected to an outside facing net directly. Most BOFH's dont want anything from controllers on their networks and used on dedicated networks with no web access.

    A/V control is not meant to spy on anyone. It's simply meant to control A/V equipment and in debugging systems during installation we do monitor the cat5 / crestnet / AMLink wires tied to it.

    But again i repeat. This is not equipment that's normally tied directly to the internet and as a programmer / designer i would never recommend to use a local network to tie it all together.It's a separate lan with separate access points for the panels where required.

    This is not a spying device. It's a controller for which we have a backdoor cause clients loose passwords :)

    1. Captain DaFt

      Re: Backdoor

      If it looks like a duck, walks like a duck, and quacks like a duck, calling it a "swimming chicken" is just being disingenuous.

    2. Anonymous Coward
      FAIL

      Re: Backdoor

      "Almost all..." is a dangerous qualifier right there. Add in that crossing network boundaries is something that anyone with any talent does on a regular basis (white- or black-hat) and you have a real problem there. Where you really win a prize for (pick a derogatory term) is that wireless access points are in the mix. I see vulnerabilities for everyone's gear pop up in my collection of security-fails on at least a monthly basis as well.

      It may not be a spying device, really doesn't matter, if someone can hack into the system it can readily be turned into a dream spying device. Total fail.

    3. Pascal Monett Silver badge

      Re: "A/V control is not meant to spy on anyone"

      What it is meant to do is irrelevant to the hacker. What it can do is the only thing that counts.

      And that hardware can be remotely accessed and used without owners suspecting anything. That is a hackers dream.

    4. DropBear
      FAIL

      Re: Backdoor

      This was a shitty way to "assist the customer" even back in the day of AWARD_SW - by now, even the village idiots should know better, m'kay?

    5. Anonymous Coward
      Anonymous Coward

      Re: Backdoor

      Hypothetically speaking if I had these things on my network I'd be reassured about that and get back to muting IPS alerts and browsing youtube.

    6. tbsny

      Re: Backdoor

      Riddle me this :

      What about the ISEC IPDC and other CDS that use the AMX to store the classified information to populate the codecs ??????????????? this is a BIG PROBLEM.......Classified information everywhere and when you are routing the classified information through the AMX to the VTC to be displayed on the far end what happens the ?????????????

  9. Destroy All Monsters Silver badge
    Gimp

    If this is a debugging port, I imagine a customer-settable key pair would be minimum requirement.

  10. Anonymous Coward
    Anonymous Coward

    So who had access?

    Right it has a backdoor, it has SSH access, so its a remote backdoor.

    So has NSA been using it? If so what stopped them using it against the executive branch? You don't put remote access in if remote access isn't the main purpose.

    If the device had a bad network connection, then then SSH connection would also be broken, making the debug claim sound bogus.

    1. tom dial Silver badge

      Re: So who had access?

      What is described clearly is extremely bad practice, and SSH capability clearly enables remote access for some value of remote. That said, the vulnerability can be mitigated by firewalls or air gaps while enabling access for debugging by local staff. As always, the services have to be manageable and usable as well as secure against the expected threats. Managers never will like to sign off on risk acceptance, but those not hopelessly dense know there is risk, and accept the fact.

  11. Anonymous Coward
    Anonymous Coward

    Web Password

    Has anyone tried recovering their AMX web password recently? Had an educational coversation about plain text passwords with their web guys last year...

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like