back to article 'Devastating' bug pops secure doors at airports, hospitals

Criminals could waltz into secure zones in airports and government facilities by hacking and jamming open doors from remote computers over the Internet, DVLabs researcher Ricky Lawshae says. The since-patched vulnerabilities affect HID's flagship VertX and Edge controllers which are distributed in scores of busy locations and …

  1. AndrueC Silver badge
    Joke

    Sounds like an open and shut case.

    1. Anonymous Coward
      Coat

      Blinkin LEDs

  2. Anonymous Coward
    Anonymous Coward

    Popping door access controlled doors is easier than you think ...

    What's more worrying is that most door access control systems cache the 'permitted' swipe cards in the controllers to survive comms issues with the server. This means that you can spoof the server and inject cards into the controllers directly.

    Or run a gateway hijack using Cain and Abel and pop the doors by sending unlock commands from your MITM door access server.

    We demoed this to our door access supplier which caused them to implement an encryption mechanism for their controllers. Which is great for us - but more of a problem for all of the existing installed systems which are generally fitted by alarm companies who have no need for network security capabilities ....

    AC 'cos you know, embassies, airports, pharmacies, hospitals, police stations etc might make tasty targets.

    1. Gnosis_Carmot

      Re: Popping door access controlled doors is easier than you think ...

      No, "What's more worrying" is that morons either put these things on non-segregated networks or even worse interweb the things. STUPID STUPID STUPID!

      1. Mark 85

        Re: Popping door access controlled doors is easier than you think ...

        Exactly... why the hell a door system needs to be web-facing or even connected to a corporate LAN is beyond me. Same goes for such critters as HVAC.

        1. Anonymous Coward
          Joke

          Re: Popping door access controlled doors is easier than you think ...

          If they are not on the internet, how is Ethan supposed to get in?

        2. razorfishsl

          Re: Popping door access controlled doors is easier than you think ...

          Obviously you have not met my management team.

          it's in the cloud 'u' know...

  3. Anonymous Coward
    Anonymous Coward

    The service runs as root?

    That's just plain laziness on the part of the programmers. There's no need for that, and if they had practiced a defensive approach to security that assumes bugs are likely they could have avoided this. They could have run the service as an unprivileged user belonging to a 'led' group that had access to that device (or have it use a setuid binary owner root:led mode 110 that flipped the LEDs, if root was somehow mandatory to do this)

    Sad that a company that designs security hardware understands absolutely fuck all about software security. Sad, but not surprising.

    1. This post has been deleted by its author

      1. Anonymous Coward
        Anonymous Coward

        Re: The service runs as root?

        No, the real problem is the use of functions like system(). The whole idea of building applications by the outdated technique of executing command line tools through calling a shell should be banned in any sensible modern application (no true parameter check, no true error handling). It's just looking for trouble, and it's lazy programming - it's just like car-stacking to build an house of cards that will eventually crumble.

        1. This post has been deleted by its author

      2. Loud Speaker

        Re: The service runs as root?

        Less than zero? Definitely not.

        I beg to disagree. I have a great need for a device that will flash an LED a negative number of times - it would eliminate the annoyance of all those other blinking LEDs in the bedroom at night. And if the same device is to be used in the server room, it will probably need to be a 32 bit signed integer.

        I await a reply explaining the practical use of a negative float to enumerate LED flashes. Although I think an imaginary count might be an aid to handling hypothetical and virtual LED flashes.

        1. ben kendim

          Re: The service runs as root?

          "I beg to disagree. I have a great need for a device that will flash an LED a negative number of times - it would eliminate the annoyance of all those other blinking LEDs in the bedroom at night. "

          No, what you need is a DED - flashed a positive number of times. Digikey has lots of high intensity dark emitting diodes...

          1. Anonymous Coward
            Anonymous Coward

            Sanitizing input

            Sure, you should do that also. But to assume that because you sanitized input you're fine is the height of hubris. There have been many many bugs over the years where input that was sanitized was found to not be fully sanitized or in the right way, i.e. if changes were made to what was being input that caused the sanitizing code to behave differently.

            That's why step one is to make it not run as root, so if an exploit happens you don't give away root. Sure, maybe you use non-privileged access as a building block towards privileged access, but that requires finding a separate privilege escalation bug. The idea is to raise the bar for exploit as high as possible by protecting yourself in every way possible, rather than say "my input sanitizing code is perfect, so the job is done".

            1. Anonymous Coward
              Anonymous Coward

              Re: Sanitizing input

              Maybe they found the utility to flash the LEDs runs as root only.... so they made the whole application run as root...

          2. PNGuinn
            Boffin

            Re: DED

            I am given to understand that the cost of correctly labelling the functions of those devices is somewhat difficult and has up to now limited their adoption.

      3. Roo
        Windows

        Re: The service runs as root?

        "Good code by real programmers is exploit free, and doesn't run as root anyway, even though it could. Belt and braces atitude to security."

        In my experience the code quality isn't the real issue, and I think it's a nigh-on guaranteed that everyone makes mistakes - and the environment around a bit of code changes too - and that can transform previously legit code into garbage... ;)

        The real issue is finding the resources (aka money + time) to do the work. Typically the folks I work with are buried under a mountain of must-do changes and no one who calls the shots sees fixing code that works (eg: stop running as root and employ priv-sep) as being a priority.

      4. Velv
        Boffin

        Re: The service runs as root?

        "The service runs as root? ... is just plain laziness..."

        "If the input was sanitised, it wouldn't even matter that it was running as root"

        Any single failure probably wouldn't be an issue, but this problem and more importantly the subsequent blindness in the comments just highlight that *ALL* areas of the system need to take responsibility for the security of the entire system. No piece can ever rely on security being provided by some other piece.

      5. Anonymous Coward
        Anonymous Coward

        Re: The service runs as root?

        "Good code by real programmers is exploit free"

        Really?

        Always?

        I suppose if they wrote the perfect compiler and OS or at least understood every nuance and shortcoming of both and then wrote good code it might be...

    2. ARaybould

      Re: The service runs as root?

      Don't pick on the programmers - no-one taught them anything about security.

  4. djack

    Damn, that beats my favourite HIDism

    I don't normally play with such things in anger, but I did spend a few minutes looking at a HID access control system a few years ago (shared office building and my client was only a tenant, so the controllers etc were inaccessible to me).

    Not only was the thing using the hellishly broken Miffare Classic cards, but the system wasn't even checking the encrypted blocks of the card, everything was done on the UID that is read without authentication and sent in clear.

    What took the biscuit was possibly the world's most ironic encryption key. The keys when converted to ASCII read as 'HID IS' and ' GREAT'.

  5. jake Silver badge

    One wonders ...

    What kind of "security expert" thinks that the Internet is secure in any way, shape,or form? I mean, really, Internet connected doors at airports?

    Fucking numpties.

  6. Doctor_Wibble
    Angel

    Yay flashing lights

    Can it do short and long, e.g. "-... --- -... -... -.-- - .- -... .-.. . ... "?

    obv oblig: http://xkcd.com/327/

  7. jake Silver badge

    As a side note, there is that "pop" meme again.

    Who, what, when, where and why did the "crack" concept become replaced with the "pop" meme in this forum? That's a totally serious question. This is a news outlet, kindly elucidate us on the concept. (I fully expect this comment to be nixed (again) ... What are you afraid of, anyway.)

    1. BebopWeBop

      Re: As a side note, there is that "pop" meme again.

      Well in the case of doors, I have always understood that the term 'pop' has been used for many years (popping a safe for example).

      1. jake Silver badge

        @BebopWeBop (was: Re: As a side note, there is that "pop" meme again.)

        Really? News to me ... and I've been in the corporate security business for decades.

        Do you have a site where I can catch a sight of that cite?

        1. djack

          Re: @BebopWeBop (was: As a side note, there is that "pop" meme again.)

          No need to get up-tight about it. It's just an informal expression - all over the likes of Full Disclosure and researchers' blogs.

        2. BebopWeBop

          Re: @BebopWeBop (was: As a side note, there is that "pop" meme again.)

          @Jake

          Well, as far as websites go - a cursory look- you might try a popular US chain of locksmiths - www.popalock.com, and there is always the term used for opening (elderly - I've seen it done on a 1980s Rover) car doors using a tennis ball - useful for those who have locked themselves out.

          If you want to go earlier (I have a large collection of crime fiction), it's used in at least two 1930s/40s crime thrillers, The Saint in Miami (I believe) by Charteris, and an Edgar Wallace book. Many of the latters books are available on Gutenberg. I'll leave it as an exercise for you to complete. More recently, try Time to Crime: Doing Time, Listening to Crime By Michael Lee (2009/10?) and you'll find it again.

          So there we are within 90 seconds, even corporate security professionals can learn something on the Reg :-)

          1. Anonymous Coward
            Anonymous Coward

            Re: @BebopWeBop (was: As a side note, there is that "pop" meme again.)

            Given the source, I'm going to blame Pringles.

        3. Anonymous Coward
          Anonymous Coward

          Re: @BebopWeBop (was: As a side note, there is that "pop" meme again.)

          "... and I've been in the corporate security business for decades"

          Doesn't mean you were any good at it though does it?

        4. Anonymous Coward
          Anonymous Coward

          Re: @BebopWeBop (was: As a side note, there is that "pop" meme again.)

          Popping something, like the hood, a safe, etc, is old slang and certainly existed back in the 60's in the UK.

          http://www.popalock.com/ is also a locksmith company, they will come out when you need a lock popped.

          Unless this forum invented time travel, popping as a euphemism for breaking has existed since way before I was born, and I am distinctly middle-aged.

  8. x 7

    this opens a back door to a whole load of other risks

    or is it a back passage?

    1. TheOtherHobbes

      Welcome to the Internet, where your back door has a back door.

  9. Anonymous Coward
    Anonymous Coward

    The rush to market

    I've worked on door entry systems in the past. In a company that sold our "proof of concept demo" to a UK Based Building Society. Installed in branches and head office. Kinda scary to find out as that system had zero security in it, everything transmitted in plain text, pretty trivial to spoof.

    Trouble is sales men just sell boxes and features. They don't want any development time wasted on features their client cannot see as it will cut into their commissions. To the layers of management, if the product works then sell it. "We can add security layers at a later time - when a client requests and pays for it".

    Same old story... this was the mid-1990s when the above happened. So it does not surprise me it still goes on as Management are still Management and Sales Staff are still brainless. You can see how little things change just by looking at BOFH

  10. jms222

    As I have said to one particular colleague of mine.

    NEVER EVER pass something user-supplied to a shell. EVER. That includes system(). Of course he went ahead thinking he could escape data himself not realising that no you can't escape single quotes inside single quotes.

    I would now add NEVER put user-supplied data into an environment variable that might be passed to bash even if it was supposedly fixed as the fix was a nasty hack. In fact don't even have bash.

    Preferably don't use a heavyweight OS at all.

  11. TeeCee Gold badge
    Headmaster

    Odd.

    I can't find any airlines that fly to the Southern Ohio Medical Centre......

    1. bob, mon!

      Re: Odd.

      >I can't find any airlines that fly to the Southern Ohio Medical Centre......

      Maybe some LifeFlight helicopters?

    2. Mark 85
      Trollface

      Re: Odd.

      I can't find any airlines that fly to the Southern Ohio Medical Centre......

      They would but the runway on the roof is a bit limited in run-out for landing and take-offs.

  12. picturethis
    Alert

    So, the scenes in movies are true..

    I always thought that the scenes in movies where "hackers" (sic) are shown remotely opening secure doors was just a bunch of nonsense. It turns out that it's true - who knew?

    I've been watching too many TV episodes of "leverage" lately I guess..

    A "battening down the hatches" icon seems appropriate..

  13. Adam JC

    Attack vector

    How would one gain access to the lock, to send these UDP packets? Most of the systems I've managed/come across are hard-wired (Salto, etc) and don't communicate using TCP/IP at all.

    I'm trying to establish where this attack is carried out, can you walk up to a door or do they emit a local SSID of some sort? (Or does the controller?)

    I've never used HID branded kit so please excuse my ignorance, I've deployed Salto via Mifare plenty of times but never HID.

    1. Andy A

      Re: Attack vector

      The swipe reader and physical lock will be electrically connected to a controller box nearby. That box will be connected via an RJ45 lead to an ordinary switch. IF someone had their brain in gear, it will be on a different VLAN to the rest of the kit in the building.

      Once you are inside the building, say in a visitors' area, you can attack the RJ45 and open the rest of the doors.

      1. Anonymous Coward
        Anonymous Coward

        Re: Attack vector

        Actually, you put the control panels in the most secure area you can find - they should never be in an unlocked electrical riser in the public space. That would be the cheapest contractor getting it done and gone, that's not how things get done today!

        I've always wondered what would happen if you drilled carefully into a reader from outside and then hooked out and patched the wires across to a handy mains socket (or 10000 farad capacitor) when the magic smoke cleared would the door be open or closed? What would the door access software have logged?

        What does fail safe mean in this context, fail so no one is trapped or fail so the door is still secure ?

        The people should be told!

        1. adfh

          Re: Attack vector

          Regarding "fail safe" and where it needs to be implemented, depends on the door's location in relation to access and egress routes in the event of an emergency and the security of what's being protected.

          Some door locks will fail open, some will fail secure - it all depends on where the door is, and if it's legally required to be open in the event of an emergency... This is why in some places you'll find an access card reader, and then next to it a "break glass" override.. or why if you have a card to access an office, often for egress you can just use the doorhandle ("Escape set" configuration).

          Depending on how the system's implemented, there isn't always a direct link between reader and door lock - so overloading the signal/power lines on a card reader may only succeed in blowing out the port on a local controller node, whilst the lock may be separately connected. By releasing the magic smoke on the card reader, you likely just make it harder for anyone to open the door at the location, and in a properly monitored install, flag that there's a fault in the reader equipment at a given location.

  14. This post has been deleted by its author

  15. Cynic_999

    It runs Linux???

    Why the heck does a door entry device need a Linux OS? I've designed a few such units, and the most advanced functionality you would need to implement can be written in assembler and run by a Z80 or PIC in less than 32KB of ROM with a bit of flash to store what you need to enable offline operation - and that included PK and AES encryption algorithms. Unless you want the unit to do iris or fingerprint comparisons of course.

    1. allthecoolshortnamesweretaken

      Re: It runs Linux???

      But Linux is "safe", because it doesn't have all those nasty Windows viruses!

  16. Old Handle
    FAIL

    Too funny

    This should be memorialized as THE classic security blunder. I can just imagine whoever did this thinking, or perhaps even saying out loud, "It's just blinking lights, no need to worry about security on this bit..."

  17. gollux
    Mushroom

    More cool news...

    From the Internet of Sh!t

  18. allthecoolshortnamesweretaken

    IoT FTW !

  19. Stoneshop
    Devil

    Response

    The LED service Lawshae messed with is part of a reply door controllers would send to the central remote management service in response to a UDP discoveryd probe.

    "Thank you for making a simple door and an access cracker very happy"

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like