IP-Time N608

IP-Time N608

Reviewed in May 2024 by i46 s.r.o       |    Conclusion of the Fast Check:   ⚠️

Important. This router has been sold by IP-Time since at least 2010. Unless a major feature, impacting the security of the router, is deployed on the router post CRA-enactment, it will not be required to comply with the CRA.

This Fast Check is for information purpose only.

I46’s analysis finds that this router is poorly secured and fails to meet all the requirements of the Cyber Resilience Act. Indeed, during the analysis of the router, i46 found that three core requirements of the CRA were not met:

  • Annex I, paragraph (b): “be made available on the market with a secure by default configuration, unless otherwise agreed between manufacturer and business user in relation to a tailor made product with digital elements, including the possibility to reset the product to its original state”;

  • Annex I, paragraph (d): “ensure protection from unauthorised access by appropriate control mechanisms, including but not limited to authentication, identity or access management systems, and report on possible unauthorised access;”

  • Annex I, paragraph (j): “be designed, developed and produced to limit attack surfaces, including external interfaces;”

 

Below, i46 details a few core features of the router, and provides their compliance findings for each of them.

Which product should i46 review next?

Let us know which product should be reviewed next, by sending us an email to info@i46.cz

Compliance Table

Feature

Findings

Compliance with the CRA

Unique Password

The default password of the device is admin/admin.

🔴 No

Strong password enforcement

No

🔴 No

Minimal surface (physical)

The device includes RJ-45 ports, power and reset ports

🟢 Yes

Minimal surface (software)

Port 80 (http) is open

🟢 Yes: this port is required for device management.

Minimal surface (software)

Port 3000 (ceph) is open

🔴 No: This service should be optional (and closed by default)

(Severity: Medium)

Minimal surface (software)

Port 55555 (http) is open

🔴 No: Having a web server that allows remote execution on the device is bad practice.

It is not clear why this function is required and highly likely, this function can be replaced with a more secured method.

(Severity: Very High)

As shown in the above table, the IP-Time N608 fails i46’s Fast Check.

While the device does not need to comply with the Cyber Resilience Act, due to being manufactured before the Act’s enactment, it bears highlighting that the weaknesses identified during the Fast Check means that businesses and people wishing to use this router should proceed with caution.

Who is i46?

i46 s.r.o, a Czech Republic-based company, is a specialist in cybersecurity compliance for IoT manufacturers. Their team of experts meticulously analyzes various devices within their laboratory, forming the foundation for these initial assessments.

The Fact Check service is provided by Cyber Resilience Act.eu and  i46 s.r.o., as a way to empower the community. It is important to remember that the CRA Fast Check analysis is provided “as is” and shouldn’t be considered a replacement for a comprehensive cybersecurity assessment.

If you encounter any errors in this analysis, please don’t hesitate to reach out to us at info@i46.cz.

LA MISE EN CONFORMITÉ

Je suis un fabricant d'appareils connectés

Les fabricants d'appareils connectés sont les premiers concernés par la mise en conformité. 

La loi sur la cyber- résilience modifie le mode de fonctionnement des fabricants.

Notre guide explique ce que vous devez faire, le temps dont vous disposez pour vous mettre en conformité et les conséquences juridiques de la non-conformité.

Je suis développeur de logiciels

While free and open-source software, providing that their makers do not derive any profit from their distribution, does not fall under the purview of the Cyber Resilience Act, non-embedded software and software that remote process data from IoT devices need to comply with the Act.

J'importe / je distribue / je revends

Les importateurs, les distributeurs et les revendeurs de dispositifs connectés sont soumis à de nombreuses exigences en vertu de la loi sur la cyber- résilience et, dans certaines circonstances, peuvent même être considérés comme des fabricants.

Nos guides détaillent les responsabilités de ces acteurs.