Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

CyberLock, IOActive Argue Over Disclosure of Electronic Lock Flaws

Security firm IOActive has published an advisory detailing some vulnerabilities in electronic locks from CyberLock. The lock maker is not happy about it and even attempted to prevent the disclosure of the security bugs with a DMCA notice.

Security firm IOActive has published an advisory detailing some vulnerabilities in electronic locks from CyberLock. The lock maker is not happy about it and even attempted to prevent the disclosure of the security bugs with a DMCA notice.

The CyberLock key-centric access control system consist of electronic lock cylinders and programmable smart keys, or CyberKeys. The product can be used to secure doors, gates, trucks, shipping containers, and other assets.CyberLock CyberKey

IOActive researcher Mike Davis has identified several security issues in CyberLock’s product. After some reverse engineering, the expert discovered that keys can be cloned using a site key obtained by intercepting communications between the key and the lock. These site keys, which can be recovered from the cylinder, are stored in clear text.

Davis also noted in his advisory that an attacker who possesses a cloned key can easily modify profile-based restrictions, such as one-time access and time of day restrictions, because they are based entirely on the logic of the key itself. It’s worth noting that the vendor’s website states that keys cannot be duplicated.

According to the researcher, the encryption algorithm is weak and it does protect credentials properly, and the logging system can be easily tricked because the validity of key IDs is not checked, allowing a malicious actor to enter bogus data into the log.

As for physical security, Davis noted that CyberLock cylinders can be relatively easily removed from the padlock enclosure.

The researcher says he attempted to report his findings to the vendor, but without success. However, just as he was preparing to publish the advisory, Davis received a notice from a Jones Day lawyer representing the electronic lock maker.

IOActive was asked to refrain from making the vulnerabilities public until CyberLock had the opportunity to analyze the issues and address them.

“Of course, as you know, the public reporting of security vulnerabilities can have significant consequences. CyberLock also takes the protection and enforcement of its intellectual property rights seriously and, prior to any public reporting, wants to ensure that there have been no violation of those rights, including CyberLock’s license agreements or other intellectual property laws such as the anticircumvention provision of the Digital Millenium Copyright Act,” the letter read.

Advertisement. Scroll to continue reading.

After IOActive published its advisory, CyberLock’s legal representatives sent a second letter providing clarifications and disputing some of the issues mentioned in the report. They claim the advisory contains some “material inaccuracies and omissions” and that it “mischaracterizes the severity of the purported vulnerabilities.”

CyberLock’s representatives claim the findings are not applicable to all the products and software provided by the company. They stated that the vendor continually updates firmware to address security flaws, including the ones mentioned in IOActive’s advisory.

“Moreover, IOActive’s reverse engineering process required the use of skilled technicians, sophisticated lab equipment, and other costly resources not generally available to the public to extract CyberLock’s firmware from an embedded semiconductor chip,” the letter reads. “CyberLock does not claim, and never has, that a door protected by one of its product is impregnable.”

The company says it’s unhappy that its technical staff was given little notice to analyze the vulnerabilities, and noted that it’s surprised by IOActive’s “aggressive stance and tight deadlines on the publication of its report.”

Others also believe that the researcher shouldn’t have made his findings public before CyberLock got a chance to review them, and some even accused him of trying to get coverage in the press with this story. The researcher says this wasn’t a marketing ploy and that he “just wanted to hack stuff.” He blamed CyberLock for not handling the issue properly on its end.

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.

Vulnerabilities

The latest Chrome update brings patches for eight vulnerabilities, including seven reported by external researchers.