Synopsis
Without prior knowledge of the PIN, an attacker with physical access to a base station is able to pair a rogue keypad and subsequently disarm the alarm system.
There is a button on the bottom of the base station (next to the batteries) that, after being pressed, will allow new devices to be paired. Specifically, a rogue keypad (which is already paired to another base station) can be added to facilitate the attack. While paired to both base stations, the attacker can disarm the "victim" base station.
Also, please note that we could not complete the full attack in under 30 seconds (default entry delay before the alarm triggers). This limits attackers to an insider threat. A more feasible scenario is that an attacker could pair the rogue keypad while in the house, and disable the alarm at a later date (e.g. when burglarizing).
Proof of Concept
Note: The PoC below is just one example. We were also able to disarm the victim base station by entering the Setup and Naming menu, and then exiting out.
Follow the steps below to disarm an armed base station.
Assumptions:- There is a "victim" base station ("BS1") with a keypad ("KP1") already paired.
- There is an "attacker" base station ("BS2") with a keypad ("KP2") already paired.
- Arm BS1 in "home" mode.
- Power down BS2.
- Power down KP2.
- Remove the bottom cover of BS1 to reveal the battery compartment. Press the small white circular button to enable pairing of new devices.
- Power on KP2. After the power on sequence completes, it should pair to BS1.
- After KP2 pairs, turn on BS2.
- Reboot KP2.
- After KP2 powers on, the display should say "off" (indicating it's talking to BS2).
- Press "home" on KP2.
- Press "off" on KP2 and enter the proper PIN for BS2.
- Press "away" on KP2.
- Once the countdown has begun, press "off" on KP2.
- Both base stations will be disarmed. The PIN for BS1 was not required.
Solution
Ensure your base station is updated to firmware 1.4.x or higher. This update was available prior to Tenable's discovery.Disclosure Timeline
All information within TRA advisories is provided “as is”, without warranty of any kind, including the implied warranties of merchantability and fitness for a particular purpose, and with no guarantee of completeness, accuracy, or timeliness. Individuals and organizations are responsible for assessing the impact of any actual or potential security vulnerability.
Tenable takes product security very seriously. If you believe you have found a vulnerability in one of our products, we ask that you please work with us to quickly resolve it in order to protect customers. Tenable believes in responding quickly to such reports, maintaining communication with researchers, and providing a solution in short order.
For more details on submitting vulnerability information, please see our Vulnerability Reporting Guidelines page.
If you have questions or corrections about this advisory, please email [email protected]