The wireless-communication feature of the ABUS Secvest FUBE50001 device does not encrypt sensitive data such as PIN codes or IDs of used proximity chip keys (RFID tokens). This makes it easier for an attacker to disarm the wireless alarm system.
The product transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.
Link | Tags |
---|---|
https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-014.txt | third party advisory exploit |
https://www.youtube.com/watch?v=kCqAVYyahLc | third party advisory exploit |
http://seclists.org/fulldisclosure/2020/Jun/26 | third party advisory mailing list |
http://packetstormsecurity.com/files/158204/ABUS-Secvest-Wireless-Control-Device-Missing-Encryption.html | third party advisory |