News


  • At SEMICON Taiwan 2023 CHT Security showcased the latest OT security solution

    At SEMICON Taiwan 2023, CHT Security showcased the latest OT security solution including: OT Cyber Posture Evaluation, OT SOC, OT IDS/IPS and IEC 62443 Consulting Service.In addition, SEMI E187 and SEMI E188 Standards is important topics to semiconductor industry.

    More
  • CHT Security Blue Team Discovered Multiple Vulnerabilities in Well Known Camera IoT Devices

    SummaryVulnerability List1. [CVE-2023-38027] Command Injection2. [CVE-2023-38025] Command Injection3. [CVE-2023-38024] Hidden Functionality4. [CVE-2023-38026] Hard-coded CredentialDetails1. Command InjectionDescriptionThe product has insufficient filtering for special parameter in their communication protocol.An unauthenticated remote attacker can perform command injection attack to execute arbitrary system commands or disrupt service.ImpactUnverified attackers can get full control of device to execute code remotely in the network.The confidentiality, integrity, and availability of data and system will be compromised.VersionProduct Firmware version: 1.00362. Command InjectionDescriptionThe product has insufficient filtering for special parameter in their communication protocol.An unauthenticated remote attacker can perform command injection attack to execute arbitrary system commands or disrupt service.ImpactUnverified attackers can get full control of device to execute code remotely in the network.The confidentiality, integrity, and availability of data and system will be compromised.VersionProduct Firmware version: 1.00363. Hidden FunctionalityDescriptionThe product has hidden function to enable the insecure telnetd serviceA remote attacker known the credential can login directly into system to execute arbitrary system commands or disrupt service.ImpactUnverified attackers can enable the telnetd service without authentication.The confidentiality, integrity, and availability of data and system will be compromised.VersionProduct Firmware version: 1.00364. Hard-coded credentialsDescriptionThe product has hard-coded credential in u-boot firmware, the attacker can easily fetch / modify system with the credential.ImpactAttackers can fetch/modify the firmware with the credentials.The confidentiality, integrity, and availability of data and system will be compromised.VersionProduct Firmware version: 1.0036Credit* Lee Pu, Weber Tasi, KaiChing Wang (CHT Security)

    More
  • CHT Security Blue Team Discovered a MitM Command Injection Vulnerability in an Open-Source Red-Team Penetration Testing Framework (CVE-2023-34758)

    CVSSv3.0:8.1/10Affected Versions: = 1.5.0, 1.5.40Abstract: A flaw was discovered in the cryptographic key-exchange protocol in a C2 framework up to version 1.5.39. The weakness allows a MitM with access to an implant binary to hijack connections between the corresponding implant and its C2 server, and to subsequently execute arbitrary code on the implanted device.Details: The flawed ECDH key-exchange protocol implementation in a C2 uses static private and public keys embedded in the implant executable to derive a shared secret. This gives the attacker with access to an implant executable ability to derive the corresponding shared secret used by the open-source red-team penetration testing framework to establish secure connections. A man-in-the-middle can exploit the weakness to retrieve encryption keys form the corresponding implants traffic and forge valid encrypted data streams, granting the attacker ability to execute arbitrary code on the implanted device.Mitigation:Update the framework to 1.5.40 or newer versions.References:https://github.com/advisories/GHSA-8jxm-xp43-qh3q

    More
  • 2023 Taiwan Security Solution Day In Tokyo!

    The Industrial Technology Research Institute (ITRI) is spotlighting the future of cybersecurity at the upcoming Taiwan Security Solution Day in Tokyo on June 6.Zero Trust Architecture (ZTA) has quickly become industry-standard for fighting against cyberattacks, and the event will explore how Taiwans cybersecurity companies can leverage ZTA and other leading-edge strategies to safeguard enterprises.CHT Security joined the delegation in Japan to showcase the cutting-edge products, including the award-winning SecuTex NP/ED, CypherCom the end-to-end encryption communication system, and cybersecurity testing service.

    More
  • CHT Security Showcased Cutting-edge Products at Computex 2023

    At Computex 2023 from May/30-June/2, CHT Security Showcased its cutting-edge Products, including the award-winning SecuTex NP/ED, CypherCom the end-to-end encryption communication system, and cybersecurity testing service.

    More
  • CHT Security Blue Team Discovered Command Injection Vulnerability in Pet Feeding Camera IoT Device

    SummaryVulnerability List1. [CVE-2023-28704] Command InjectionDetails1. Command InjectionDescriptionThe product has insufficient filtering for special parameter of device log management function.An unauthenticated remote attacker in the Bluetooth network with normal user privileges can exploit this vulnerability to perform command injection attack to execute arbitrary system commands or disrupt service.ImpactUnverified attackers can get full control of device to execute code remotely in the Bluetooth network.The confidentiality, integrity, and availability of data and system will be compromised.VersionProduct Firmware version: 542, Lib version: 237.144Credit* Lee Pu, Weber Tasi, KaiChing Wang (CHT Security)

    More
  • CHT Security SecuTex Wins Best Choice Awards at COMPUTEX TAIPEI 2023

    CHT Security SecuTex won the best choice award at COMPUTEX 2023. SecuTex is a cybersecurity product family including network protection and endpoint detection. SecuTex network protection is like the security dashcam at internet gateway. It records all network packets for real-time anomaly detection and incident notification as well as post-incident forensics and most importantly, with sandbox analysis and experts analysis verification. It is a useful tool for network management. SecuTex endpoint detection can scan endpoints by referring to government configurations baseline, software update status and anomaly detection to control risk and then conduct countermeasures. It best suits for cybersecurity management for enterprises.The evaluation comprises with the aspects of technology, innovation, and market potential. SecuTex product family derived from having the profound cyber defense and forensics experience. The key success factor why SecuTex stands out is because it supports full-time recording without packet loss and with the comprehensive threat intelligence to conduct anomaly detection to assist administrators finding root causes by referring to the most completed payload packets. Regarding SecuTex endpoint detection, it provides device posture to alert the suspicious file, process and connections when the incident is about to occur.Jeff Hung, general manager of CHT Security, said that it is of great significance to win the COMPUTEX Best Choice award for the second time this year. Last year, CHT Security won the first Cybersecurity Best Service of the COMPUTEX Best Choice Award, and was accepted for a presidential meeting, affirming the recognition of CHT Security as a security service provider company. Winning the award this year again represents an important milestone of CHT Securitys expansion from a security service provider company to a cyber security product company. At present, the products have achieved several significant reference site in the industries such as government, finance, critical infrastructure, educational academy, and have also acquired proven records overseas. It is expected that there will be an even stronger growth this year.CHT Security is the leading MSSP in Taiwan with years of experience in cyber defense practices and the RD capabilities. The company is ISO 27001, ISO 27701, ISO 20000, ISO 17025,IEC 62443 certified and, in the governments annual review, CHT Security is the only cybersecurity company that achieved the top rating for consecutive years in every evaluation. CHT Security delivers cyber security service and solutions including security testing, SOC monitoring, incident response, digital forensics and CHT Security branded product to satisfy cybersecurity needs for enterprises and government institutions.

    More
  • CHT Security's New Partnership with SOSA & i2i

    Our partnership with Taiwans Innovation to Industry (i2i) continues to form meaningful collaborations.Were proud to announce CHT Securitys new partnership with SOSA, a leading open innovation company.SOSA will identify Operational Technology Security companies that are revolutionizing the field with their solutions, to enhance CHT Securitys cybersecurity offering, empowering our partners to deliver a wide range of industrial security applications to their valued customers.SOSA, i2i and CHT Security are taking the next step in safeguarding critical assets, businesses and individuals, forging a path toward a more secure digital future.#openinnovation #corporateinnovation #cybersecurity

    More
  • CHT Security Blue Team Discovered Arbitrary File Upload Vulnerability in Portal Web Product

    SummaryVulnerability List1. [CVE-2023-25909] Arbitrary File UploadDetails1. Arbitrary File UploadDescriptionThe product allows uploading files of any type without restriction and does not perform session checks on its vulnerability page.ImpactUnverified attackers can upload arbitrary malicious files to execute code remotely.The confidentiality, integrity, and availability of data and system will be compromised.Versionv2 v3Credit* Lee Pu (CHT Security)

    More
  • Visit CHT Security at CYBERSEC 2023

    Welcome to visit CHT Security at CYBERSEC 2023.Well showcase SecuTex endpoint and gateway solution, CypherCom end-to-end encryption communication system, ZTA solution and supply chain management.Meet us on May/9-11 at Booth T11/T12 in Nangang Exhibition Center!

    More

For Financial Institutions

Security Assessment, ATM Drills for Offense & Defense, DDoS Drills, GDPR Consultant.

For Enterprises

Large Enterprises: Gateway Protection, Endpoint Protection, Data Security, Regular assessment, ISMS, In-depth Defense with ISPs.
SMB & Soho: Anti-virus, Anti-hacking, Internet Protection.

For Government Departments

Regulation Compliance, Regional Joint Defense, SOC, ISAC, Common Supply Contract.