[FD] [SYSS-2016-063] VMware ESXi 6 - Improper Input Validation (CWE-20)

2016-08-05 Thread Matthias Deeg
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Advisory ID: SYSS-2016-063
Product: VMware vSphere Hypervisor (ESXi)
Manufacturer: VMware, Inc.
Affected Version(s): VMware ESXi 6.0.0 build 3380124 (Update 1)
 VMware vCenter Server 6.0 U2
Tested Version(s): VMware ESXi 6.0.0 build 3380124 (Update 1)
Vulnerability Type: Improper Input Validation (CWE-20)
Risk Level: Medium
Solution Status: Fixed
Manufacturer Notification: 2016-07-01
Solution Date: 2016-08-04
Public Disclosure: 2016-08-05
CVE Reference: CVE-2016-5331
Authors of Advisory: Matthias Deeg (SySS GmbH)



Overview:

VMware vSphere Hypervisor is a type-1 hypervisor for serving virtual
machines.

The manufacturer describes the product as follows (see [1]):

"Virtualize even the most resource-intensive applications with peace of
mind. VMware vSphere Hypervisor is based on VMware ESXi, the hypervisor
architecture that sets the industry standard for reliability and
performance."

Due to improper input validation, the web server of VMware ESXi 6 is
prone to HTTP response injection attacks.



Vulnerability Details:

The SySS GmbH found out that the web server of VMware ESXi 6 is
vulnerable to HTTP response injection attacks, as arbitrarily supplied
URL parameters are copied in the HTTP header Location of the server
response without sufficient input validation.

Thus, an attacker can create a specially crafted URL with a specific
URL parameter that injects attacker-controlled data to the response
of the VMware ESXi web server.

Depending on the context, this allows different attacks. If
such a URL is visited by a victim, it may for example be possible to
set web browser cookies in the victim's web browser, execute arbitrary
JavaScript code, or poison caches of proxy servers.



Proof of Concept (PoC):

The following URL is a simple attack vector to illustrate the HTTP
response header injection vulnerability by setting an
attacker-controlled session cookie named "test" with the value "31337"
within the victim's web browser:

https:///?syss%0d%0aset-cookie:test=31337%0d%0at=1

The corresponding HTTP GET request and the VMware ESXi web server
response are as follows:

GET /?syss%0d%0aset-cookie:test=31337%0d%0at=1 HTTP/1.1
Host: 
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:47.0) Gecko/20100101
Firefox/47.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: close


HTTP/1.1 303 See Other
Date: Thu, 30 Jun 2016 15:12:23 GMT
Connection: close
Location: /?syss
set-cookie:test=31337
t=1/
X-Frame-Options: DENY
Content-Length: 0



Solution:

The manufacturer VMware has fixed the reported security vulnerability
and disclosed detailed information about the issue and a software update
for affected products in its security advisory VMSA-2016-0010 [4].



Disclosure Timeline:

2016-07-01: Vulnerability reported to manufacturer
2016-07-01: Manufacturer acknowledges e-mail with SySS security advisory
2016-07-14: Manufacturer further investigates the reported security
issue
2016-07-22: Manufacturer announces disclosure of this security issue
2016-08-04: Public release of VMware security advisory VMSA-2016-0010
and security update
2016-08-05: Public release of SySS security advisory



References:

[1] Product website for VMware vSphere Hypervisor (ESXi)

https://my.vmware.com/web/vmware/info/slug/datacenter_cloud_infrastructure/vmware_vsphere_hypervisor_esxi/6_0
[2] SySS Security Advisory SYSS-2016-063

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2016-063.txt
[3] SySS Responsible Disclosure Policy
https://www.syss.de/en/responsible-disclosure-policy/
[4] VMware Security Advisory VMSA-2016-0010
http://www.vmware.com/in/security/advisories/VMSA-2016-0010.html



Credits:

This security vulnerability was independently found and reported by
Matthias Deeg of SySS GmbH, Vladimir Ivanov, Andrey Evlanin, Mikhail
Stepankin, Artem Kondratenko, Arseniy Sharoglazov of Positive
Technologies, Matt Foster of Netcraft Ltd, Eva Esteban Molina of
A2secure and Ammarit Thongthua (see [4]).

E-Mail: matthias.deeg (at) syss.de
Public Key:
https://www.syss.de/fileadmin/dokumente/Materialien/PGPKeys/Matthias_Deeg.asc
Key fingerprint = D1F0 A035 F06C E675 CDB9 0514 D9A4 BF6A 34AD 4DAB



Disclaimer:

The information prov

[FD] [SYSS-2016-117] ABUS Secvest (FUAA50000) - Missing Protection against Replay Attacks

2017-02-21 Thread Matthias Deeg
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Advisory ID: SYSS-2016-117
Product: ABUS Secvest (FUAA5)
Manufacturer: ABUS
Affected Version(s): v1.01.00
Tested Version(s): v1.01.00
Vulnerability Type: Missing Protection against Replay Attacks
Risk Level: Medium
Solution Status: Open
Manufacturer Notification: 2016-11-28
Solution Date: -
Public Disclosure: 2017-02-20
CVE Reference: Not yet assigned
Author of Advisory: Matthias Deeg (SySS GmbH)



Overview:

ABUS Secvest (FUAA5) is a wireless alarm system with different
features.

Some of the supported features as described by the manufacturer are
(see [1]):

"
* Convenient operation via the app (Android/iOS), integrated web
  browser and also at the alarm panel
* For up to 50 users with freely selectable control options
  (code/chip key/remote control)
* Active intrusion protection in combination with additional mechatronic
  wireless window/door locks
* Video verification of alarms via email, push notifications or via the
  app
* Up to 48 individually identifiable wireless detectors, eight control
  panels, 50 remote controls
* Integrated dialling device
* VdS Home certified and EN 50131-1 Level 2
* Alarm verification via the integration of up to six IP cameras
* 32 additional wireless outputs for flexible event control
* Switching to monitoring station via protocols possible
"

Due to an insecure implementation of the used 868 MHz radio
communication, the wireless alarm system ABUS Secvest is vulnerable to
replay attacks.



Vulnerability Details:

SySS GmbH found out that the radio communication protocol used by the
ABUS Secvest wireless alarm system (FUAA5) and its remote control
(FUBE50013) is not protected against replay attacks. Therefore, an
attacker can record the radio signal of a wireless remote control, for
example using a software-defined radio, when the alarm system is
disarmed by its owner, and play it back at a later time in order to
disable the alarm system at will.



Proof of Concept (PoC):

SySS GmbH could successfully perform a replay attack as described in the
previous section using a software-defined radio and disarm an ABUS
Secvest wireless alarm system in an unauthorized way.



Solution:

SySS GmbH is not aware of a solution for this reported security
vulnerability.

For further information please contact the manufacturer.



Disclosure Timeline:

2016-11-28: Vulnerability reported to manufacturer
2016-12-05: Vulnerability reported to manufacturer again
2016-12-06: Manufacturer responded to emails
2016-12-08: Exchanged further information with manufacturer
2017-02-07: Asked manufacturer for current status concerning the
reported security issue
2017-02-20: Public release of security advisory



References:

[1] Product website for ABUS Secvest wireless alarm system

https://www.abus.com/eng/Home-Security/Alarm-systems/Secvest-wireless-alarm-system/Alarm-panels-and-kits/Secvest-Wireless-Alarm-System
[2] SySS Security Advisory SYSS-2016-117

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2016-117.txt
[3] SySS GmbH, SySS Responsible Disclosure Policy
https://www.syss.de/en/news/responsible-disclosure-policy/
[4] Plusminus video: Von wegen sicher - Wie leicht Alarmanlagen zu
knacken sind

http://www.daserste.de/information/wirtschaft-boerse/plusminus/videos/von-wegen-sicher-wie-leicht-alarmanlagen-zu-knacken-sind-100.html



Credits:

This security vulnerability was found by Matthias Deeg of SySS GmbH.

E-Mail: matthias.deeg (at) syss.de
Public Key:
https://www.syss.de/fileadmin/dokumente/Materialien/PGPKeys/Matthias_Deeg.asc
Key fingerprint = D1F0 A035 F06C E675 CDB9 0514 D9A4 BF6A 34AD 4DAB



Disclaimer:

The information provided in this security advisory is provided "as is"
and without warranty of any kind. Details of this security advisory may
be updated in order to provide as accurate information as possible. The
latest version of this security advisory is available on the SySS Web
site.



Copyright:

Creative Commons - Attribution (by) - Version 3.0
URL: http://creativecommons.org/licenses/by/3.0/deed.en

-BEGIN PGP SIGNATURE-

iQIzBAEBCgAdFiEE0fCgNfBs5nXNuQUU2aS/ajStTasFAliqyqgACgkQ2aS/ajSt
TauDyBAAooHv0j6CNMghjO72OmILNbjUhXovwiPj4XqpQjKxb7NOxDpSzEfrKZPy
B2m2Ki6dUW52a0wBEoWec4ONAH+c1eDFBehFlhryGkSq

[FD] [SYSS-2016-058] CHERRY B.UNLIMITED AES - Insufficient Verification of Data Authenticity (CWE-345)

2016-09-30 Thread Matthias Deeg
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Advisory ID: SYSS-2016-058
Product: CHERRY B.UNLIMITED AES
Manufacturer: Cherry GmbH
Affected Version(s): JD-0400EU-2/01
Tested Version(s): JD-0400EU-2/01
Vulnerability Type: Insufficient Verification of Data Authenticity (CWE-345)
Mouse Spoofing Attack
Risk Level: Medium
Solution Status: Open
Manufacturer Notification: 2016-06-28
Solution Date: -
Public Disclosure: 2016-09-30
CVE Reference: Not yet assigned
Authors of Advisory: Matthias Deeg and Gerhard Klostermeier (SySS GmbH)



Overview:

CHERRY B.UNLIMITED AES is a wireless desktop set consisting of a
mouse and a keyboard.

The manufacturer describes the product as follows (see [1]):

"CHERRY B. UNLIMITED AES combines secure data transmission and an
advanced energy supply in a design which has been thought through to the
very last detail. For high professional requirements and security both
at home and in the workplace."

Some of the key benefits of CHERRY B.UNLIMITED AES are (see [2]):

* Data transmission using 128-bit encryption, complying to Advanced
  Encryption Standard (AES)
* USB cable charging function for both keyboard & mouse - even when in
  use
* High-quality, pre-charged NiMH batteries from GP with a very low
  self-discharge
* Almost interference-free wireless 2.4 GHz technology (range of up to
  10 metres)
* 3-button mouse: infrared sensor and adjustable resolution
  (1,000/2,000 dpi) with ergonomic side panels
* Multi-station capability operation of several wireless products in
  one room
* Easy to install, requiring no technical knowledge
* Mini USB receiver
* Keyboard awarded the "Blauer Engel" environmental seal

Due to unencrypted and unauthenticated mouse data communication, the
wireless desktop set CHERRY B.UNLIMITED AES is prone to mouse spoofing
attacks.



Vulnerability Details:

The SySS GmbH found out that the mouse of the wireless desktop set
CHERRY B.UNLIMITED AES is prone to spoofing attacks, as the mouse
data communication is unencrypted and unauthenticated.

An attacker can analyze the unencrypted mouse data packets of the 2.4
GHz radio communication sent by the mouse to the receiver (USB dongle)
in order to learn the used protocol. By knowing the used mouse data
protocol, it is possible to spoof mouse actions like mouse movements or
mouse clicks by sending forged data packets.

Thus, an attacker is able to remotely control the mouse pointer of a
target system that is operated with the wireless desktop set CHERRY
B.UNLIMITED AES. If the graphical user interface of the victim's system
is unlocked, an attacker can for example send a list of mouse actions
that start the virtual on-screen keyboard of the operating system and
execute arbitrary commands in the context of the currently logged in
user, for instance a download and execute attack vector.

As the attacker may not have an unobstructed view to the target system's
screen and may not know the used operating system, the screen resolution,
or the current mouse settings, this kind mouse spoofing attack is based
on heuristics. But concerning an unlocked and unattended system, an
attacker can simply try different attack vectors for different target
system configurations sequentially.



Proof of Concept (PoC):

The SySS GmbH could successfully perform mouse spoofing attacks against
a target system operated with the wireless desktop set CHERRY
B.UNLIMITED AES using an in-house developed software tool in combination
with the USB radio dongle Crazyradio PA (see [3]).

A proof-of-concept mouse spoofing attack resulting in remote code
execution using the SySS software tool Radioactive Mouse is demonstrated
in a video (see [4]).



Solution:

The SySS GmbH is not aware of a solution for this reported security
vulnerability.

For further information please contact the manufacturer.



Disclosure Timeline:

2016-06-28: Vulnerability reported to manufacturer
2016-09-30: Public release of the security advisory



References:

[1] Data sheet for CHERRY B.UNLIMITED AES
http://cherry.de/PDF/EN_CHERRY_B_UNLIMITED_AES.pdf
[2] Product website for CHERRY B.UNLIMITED AES

http://cherry.de/cid/wireless_keyboards_CHERRY_B_UNLIMITED_AES.htm?rdeLocaleAttr=en_id=
[3] Product website for Crazyradio PA
https://www.bitcraze.io/crazyradio-pa/
[4] SySS Proof-of-Concept Mouse Spoofing Attack Video
https://www.youtube.com/watch?v=PkR8EODee44
[5] SySS Security Advisory SYSS-2016-058

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2016-058.txt
[6] SyS

[FD] [SYSS-2016-060] Logitech M520 - Insufficient Verification of Data Authenticity (CWE-345)

2016-09-30 Thread Matthias Deeg
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Advisory ID: SYSS-2016-060
Product: M520 (Mouse of Wireless Combo MK520)
Manufacturer: Logitech
Affected Version(s): Model Y-R0012
Tested Version(s): Model Y-R0012
Vulnerability Type: Insufficient Verification of Data Authenticity (CWE-345)
Mouse Spoofing Attack
Risk Level: Medium
Solution Status: Open
Manufacturer Notification: 2016-06-28
Solution Date: -
Public Disclosure: 2016-09-30
CVE Reference: Not yet assigned
Authors of Advisory: Matthias Deeg and Gerhard Klostermeier (SySS GmbH)



Overview:

Logitech Wireless Combo MK520 is a wireless desktop set consisting of a
mouse and a keyboard.

The manufacturer describes the product as follows (see [1]):

"A keyboard and mouse that puts convenience and control comfortably at
your fingertips"

Due to unencrypted and unauthenticated mouse data communication, the
wireless desktop set Logitech Wireless Combo MK520 is prone to mouse
spoofing attacks.



Vulnerability Details:

The SySS GmbH found out that the mouse of the wireless desktop set
Logitech Wireless Combo MK520 is prone to spoofing attacks, as the mouse
data communication is unencrypted and unauthenticated.

An attacker can analyze the unencrypted mouse data packets of the 2.4
GHz radio communication sent by the mouse to the receiver (USB dongle)
in order to learn the used protocol. By knowing the used mouse data
protocol, it is possible to spoof mouse actions like mouse movements or
mouse clicks by sending forged data packets.

Thus, an attacker is able to remotely control the mouse pointer of a
target system that is operated with the wireless desktop set Logitech
Wireless Combo MK520. If the graphical user interface of the victim's
system is unlocked, an attacker can for example send a list of mouse
actions that start the virtual on-screen keyboard of the operating
system and execute arbitrary commands in the context of the currently
logged in user, for instance a download and execute attack vector.

As the attacker may not have an unobstructed view to the target system's
screen and may not know the used operating system, the screen resolution,
or the current mouse settings, this kind mouse spoofing attack is based
on heuristics. But concerning an unlocked and unattended system, an
attacker can simply try different attack vectors for different target
system configurations sequentially.



Proof of Concept (PoC):

The SySS GmbH could successfully perform mouse spoofing attacks against
a target system operated with the wireless desktop set Logitech Wireless
Combo MK520 using an in-house developed software tool in combination
with the USB radio dongle Crazyradio PA (see [2]).

A proof-of-concept mouse spoofing attack resulting in remote code
execution using the SySS software tool Radioactive Mouse is demonstrated
in a video (see [4]).



Solution:

The SySS GmbH is not aware of a solution for this reported security
vulnerability.

For further information please contact the manufacturer.



Disclosure Timeline:

2016-06-28: Vulnerability reported to manufacturer
2016-09-30: Public release of the security advisory



References:

[1] Product website for Logitech Wireless Combo MK520
http://www.logitech.com/en-us/product/wireless-combo-mk520
[2] Product website for Crazyradio PA
https://www.bitcraze.io/crazyradio-pa/
[3] SySS Security Advisory SYSS-2016-060

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2016-060.txt
[4] SySS Proof-of-Concept Mouse Spoofing Attack Video
https://www.youtube.com/watch?v=PkR8EODee44
[5] SySS Responsible Disclosure Policy
https://www.syss.de/en/responsible-disclosure-policy/



Credits:

This security vulnerability was found by Matthias Deeg and Gerhard
Klostermeier of the SySS GmbH.

E-Mail: matthias.deeg (at) syss.de
Public Key:
https://www.syss.de/fileadmin/dokumente/Materialien/PGPKeys/Matthias_Deeg.asc
Key fingerprint = D1F0 A035 F06C E675 CDB9 0514 D9A4 BF6A 34AD 4DAB

E-Mail: gerhard.klostermeier (at) syss.de
Public Key:
https://www.syss.de/fileadmin/dokumente/PGPKeys/Gerhard_Klostermeier.asc
Key fingerprint = 8A9E 75CC D510 4FF6 8DB5 CC30 3802 3AAB 573E B2E7



Disclaimer:

The information provided in this security advisory is provided "as is"
and without warranty of any kind. Details of this security advisory may
be updated in order to provide as accurate information as 

[FD] Radioactive Mouse States the Obvious: Exploiting unencrypted and unauthenticated data communication of wireless mice

2016-09-30 Thread Matthias Deeg
tl;dr

Today, SySS published a proof-of-concept video demonstrating a mouse
spoofing attack resulting in remote code execution due to insecure
wireless mouse communication:

https://www.youtube.com/watch?v=PkR8EODee44

-

Radioactive Mouse States the Obvious

In the course of their research project about modern wireless desktop
sets using AES encryption, Expert IT Security consultant Matthias Deeg
and IT Security Consultant Gerhard Klostermeier noticed that the radio
communication of all tested wireless mice so far was unencrypted and
unauthenticated.

The insight that radio communication of many wireless mice is insecure
and can be exploited in specific attack scenarios is not new. The fact
that this well-known security issue still exists in current wireless
mice which are part of modern wireless desktop sets using AES encryption
for keyboard data, however, brought SySS to raise the awareness for this
security vulnerability and the associated security risks once again.

By knowing the used mouse data protocol, an attacker can spoof mouse
actions like mouse movements or mouse clicks. Thus, an attacker can
remotely control the mouse pointer of a target system in an unauthorized
way. Using trial & error and good educated guesses (heuristic method),
mouse spoofing attacks can result in remote code execution on affected
target systems.

Matthias Deeg and Gerhard Klostermeier developed a proof-of-concept
software tool named Radioactive Mouse for conducting automated mouse
spoofing attacks. A proof-of-concept mouse spoofing attack resulting in
remote code execution is demonstrated in the following video:
https://www.youtube.com/watch?v=PkR8EODee44

Further information about vulnerabilities in affected wireless mice of
different manufacturers like Cherry, Microsoft, Logitech, and Perixx are
described in the following four security advisories:

SYSS-2016-058: CHERRY B.UNLIMITED AES - Insufficient Verification of
Data Authenticity (CWE-345), Mouse Spoofing Attack
https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2016-058.txt

SYSS-2016-059: Microsoft Wireless Desktop 2000 - Insufficient
Verification of Data Authenticity (CWE-345), Mouse Spoofing Attack
https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2016-059.txt

SYSS-2016-060: M520 (Mouse of Wireless Combo MK520) - Insufficient
Verification of Data Authenticity (CWE-345), Mouse Spoofing Attack
https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2016-060.txt

SYSS-2016-061: PERIDUO-710W - Insufficient Verification of Data
Authenticity (CWE-345), Mouse Spoofing Attack
https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2016-061.txt

Moreover, Matthias Deeg and Gerhard Klostermeier will present the
results of their research project about modern wireless desktop sets at
the following IT security conferences this autumn:

Hack.lu, October 18-20, 2016, Luxembourg
Hacktivity, October 21-22, 2016, Budapest
Ruxcon, October 22-23, 2016, Melbourne
DeepSec, November 10-11, 2016, Vienna
ZeroNights, November 17-18, 2016, Moscow

Currently, SySS recommends not using wireless mice without encryption
and authentication in security-sensitive environments.

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


[FD] [SYSS-2016-064] Multi Kon Trade M2B GSM Wireless Alarm System - Improper Restriction of Excessive Authentication Attempts (CWE-307)

2016-11-25 Thread Matthias Deeg
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Advisory ID: SYSS-2016-064
Product: M2B GSM Wireless Alarm System
Manufacturer: Multi Kon Trade
Affected Version(s): Unspecified
Tested Version(s): Unspecified
Vulnerability Type: Improper Restriction of Excessive Authentication
Attempts (CWE-307)
Risk Level: High
Solution Status: Open
Manufacturer Notification: 2016-07-05
Solution Date: -
Public Disclosure: 2016-11-23
CVE Reference: Not yet assigned
Author of Advisory: Gerhard Klostermeier, SySS GmbH



Overview:

The M2B GSM wireless alarm system by Multi Kon Trade (MKT) was tested
for possible security issues.

Some features of this alam system as described by the manufacturer are
(see [1]):

* You will be noticed of any alarm by call or by SMS message.
* The alarm system has a battery which will last 6 to 8 hours in case
  of a blackout.
* You can pair up to 99 devices (sensors, remote control, etc.).
* You do not have to run any cables. Everything is wireless.
* It is possible to trigger alarms in case of fire, even if the
  alarm is disabled.
* It is possible to trigger the alarm with a delay.

Due to an insecure implementation of the used 433 MHz radio
communication, the wireless alarm system M2B GSM is vulnerable to
brute-force attacks.



Vulnerability Details:

SySS GmbH found out that the 433 MHz radio communication of the wireless
alarm system M2B GSM has no protection against brute-force attacks.

A valid (paired) remote control is identified through its eight
characters long identifier. A character is either "0", "1" or "f"
(floating) (see [2]). Thus, it is possible to send any command signal
for all possible identifiers. Via such a brute-force attack, for
instance, it is possible to disarm an armed M2B GSM wireless alarm
system remotely in an unauthorized manner.



Proof of Concept (PoC):

SySS GmbH build a small device that is able to arm and disarm every M2B
GSM wireless alarm system within its radio range in max. 40 minutes.



Solution:

An extra anti-jammer device is purchasable by the Vendor. This sensor
should detect malicious devices that are trying to disarm system using
the brute-force method. If such a device is detected the alarm will
be triggered. (Solution as suggested by the vendor.)



Disclosure Timeline:

2016-07-05: Vulnerability reported to manufacturer
2016-10-13: Response from the vendor with the solution on how to
mitigate the risk
2016-11-23: Public release of security advisory



References:

[1] M2B GSM Wireless Alarm System, Multi Kon Trade
http://multikontrade.de/GSM-Funk-Alarmanlage
[2] PT2260 Remote Control Encoder, Princeton Technology Corp.
http://www.princeton.com.tw/Portals/0/Product/PT2260_4.pdf
[3] SySS Security Advisory SYSS-2016-064

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2016-064.txt
[4] SySS GmbH, SySS Responsible Disclosure Policy
https://www.syss.de/en/news/responsible-disclosure-policy/



Credits:

This security vulnerability was found by Gerhard Klostermeier of SySS
GmbH.

E-Mail: gerhard.klostermeier (at) syss.de
Public Key:
https://www.syss.de/fileadmin/dokumente/PGPKeys/Gerhard_Klostermeier.asc
Key fingerprint = 8A9E 75CC D510 4FF6 8DB5 CC30 3802 3AAB 573E B2E7



Disclaimer:

The information provided in this security advisory is provided "as is"
and without warranty of any kind. Details of this security advisory may
be updated in order to provide as accurate information as possible. The
latest version of this security advisory is available on the SySS Web
site.



Copyright:

Creative Commons - Attribution (by) - Version 3.0
URL: http://creativecommons.org/licenses/by/3.0/deed.en

-BEGIN PGP SIGNATURE-
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[FD] [SYSS-2016-072] Olypmia Protect 9061 - Missing Protection against Replay Attacks

2016-11-25 Thread Matthias Deeg
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Advisory ID: SYSS-2016-072
Product: Protect 9061
Manufacturer: Olympia
Affected Version(s): Article No. 5943 rev.03
Tested Version(s): Article No. 5943 rev.03
Vulnerability Type: Missing Protection against Replay Attacks
Risk Level: Medium
Solution Status: Fixed
Manufacturer Notification: 2016-07-21
Solution Date: 2016-11-14
Public Disclosure: 2016-11-23
CVE Reference: Not yet assigned
Author of Advisory: Matthias Deeg (SySS GmbH)



Overview:

The Olympia Protect 9061 is a wireless alarm system with different
features.

Some of the supported features as described by the manufacturer are
(see [1]):

"
Wireless alarm system with emergency call and handsfree function
Integrated GSM (Dual Band) phone dialling with message function
Handsfree/Room monitoring functions on the base unit
Up to 10 phone numbers can be programmed
Accoustic alarm via built-in sirene
Programme the forwarding of alarms to external telephones (e.g. mobile
phones)
Alarm per Telephone with message function
Individual message for each sensor, max. 10 seconds long
Power failure backup in the base unit
Can be upgraded to support up to max. 32 sensors
Easy integration of the optional sensors via Plug & Play method
"

Due to an insecure implementation of the used 868 MHz radio
communication, the wireless alarm system Olympia Protect 9061 is
vulnerable to replay attacks.



Vulnerability Details:

SySS GmbH found out that the radio communication protocol used by the
Olympia Protect 9061 wireless alarm system and its remote control is not
protected against replay attacks. Therefore, an attacker can record the
radio signal of a wireless remote control, for example using a
software-defined radio, when the alarm system is disarmed by its owner,
and play it back at a later time in order to disable the alarm system at
will.



Proof of Concept (PoC):

SySS GmbH could successfully perform a replay attack as described in the
previous section using a software-defined radio and disarm a Olympia
Protect 9061 wireless alarm system in an unauthorized way.



Solution:

The reported security issue was fixed by the manufacturer in a new
product version.

Further information can be found via the following URL [2]:
http://www.olympia-vertrieb.de/de/support/faq/sicherheitsprodukte.html



Disclosure Timeline:

2016-07-21: Vulnerability reported to manufacturer
2016-08-25: Rescheduled publication date of the security advisory in
agreement with the manufacturer
2016-09-13: According to the manufacturer, a fix to the reported
security issue is available.
2016-10-06: The manufacturer presents the solution to the reported
security issue to SySS GmbH
2016-11-14: Manufacturer provides further information concerning
the security fix
2016-11-23: Public release of security advisory



References:

[1] Product website for Olympia Protect 9061 wireless alarm system

http://www.olympia-vertrieb.de/en/products/security/wireless-alarm-systems/protect-9061.html
[2] Information by the manufacturer concerning the security fix
http://www.olympia-vertrieb.de/de/support/faq/sicherheitsprodukte.html
[3] SySS Security Advisory SYSS-2016-072

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2016-072.txt
[4] SySS GmbH, SySS Responsible Disclosure Policy
https://www.syss.de/en/news/responsible-disclosure-policy/



Credits:

This security vulnerability was found by Matthias Deeg of SySS GmbH.

E-Mail: matthias.deeg (at) syss.de
Public Key:
https://www.syss.de/fileadmin/dokumente/Materialien/PGPKeys/Matthias_Deeg.asc
Key fingerprint = D1F0 A035 F06C E675 CDB9 0514 D9A4 BF6A 34AD 4DAB



Disclaimer:

The information provided in this security advisory is provided "as is"
and without warranty of any kind. Details of this security advisory may
be updated in order to provide as accurate information as possible. The
latest version of this security advisory is available on the SySS Web
site.



Copyright:

Creative Commons - Attribution (by) - Version 3.0
URL: http://creativecommons.org/licenses/by/3.0/deed.en

-BEGIN PGP SIGNATURE-

iQIcBAEBCgAGBQJYNChfAAoJENmkv2o0rU2rT84QAKdU+IVv35uihXP5SnileQCe
ygI9vsfUBK8xrbvRN4uuBaR2Lf70dHxIZkXuGuxhh3DAn3OrM6uE4K1xQW13DMPR
toKAyMXfDWA0Q2+wz0Fz/f86VMGArWoxRTe0Wl7rxh

[FD] [SYSS-2016-107] EASY HOME Alarmanlagen-Set - Cryptographic Issues (CWE-310)

2016-11-25 Thread Matthias Deeg
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Advisory ID: SYSS-2016-107
Product: EASY HOME Alarmanlagen-Set
Manufacturer: monolith GmbH
Affected Version(s): Model No. MAS-S01-09
Tested Version(s): Model No. MAS-S01-09
Vulnerability Type: Cryptographic Issues (CWE-310)
Risk Level: Low
Solution Status: Open
Manufacturer Notification: 2016-10-05
Solution Date: -
Public Disclosure: 2016-11-23
CVE Reference: Not yet assigned
Author of Advisory: Gerhard Klostermeier (SySS GmbH)



Overview:

The EASY HOME MAS-S01-09 is a wireless alarm system with different
features sold by ALDI SÜD.

Some of the features as described in the German product manual are
(see [1]):

"
- - Alarmanlagen-Set mit drahtlosen Sensoren und Mobilfunk-Anbindung
- - SOS-Modus, Stiller Alarm, Überwachungs- und Intercom-Funktion
- - Integrierte Quad-Band Mobilfunkeinheit für GSM-Netze im 850 / 900 /
  1800 / 1900 MHz-Bereich
- - Alarmbenachrichtigung auf externe Telefone
- - Eingebaute Sirene (ca. 90 dB), inkl. Anschluss für externe Sirene
- - Unterstützung für bis zu 98 kabellosen Sensoren / bis zu 4
kabelgebundene Sensoren
- - Stromausfallsicherung der Basiseinheit durch 4 x AAA
  Alkaline-Batterien
- - Fernbedienbar per Telefon
"

Due to the use of an insecure 125 kHz RFID technology, RFID tokens of
the EASY HOME MAS-S01-09 wireless alarm system can easily be cloned and
used to deactivate the alarm system in an unauthorized way.



Vulnerability Details:

SySS GmbH found out that the 125 kHz RFID technology used by the EASY
HOME MAS-S01-09 wireless alarm system has no protection by means of
authentication against rogue/cloned RFID tokens.

The information stored on the used RFID tokens can be read easily in a
very short time from distances up to 1 meter, depending on the used
RFID reader. A working cloned RFID token is ready for use within a
couple of seconds using freely available tools.

Thus, an attacker with one-time access to the information of an RFID
token of an EASY HOME MAS-S01-09 wireless alarm system is able to create
a rogue RFID token that can be used to deactivate the alarm system in
an unauthorized manner.



Proof of Concept (PoC):

SySS GmbH could successfully clone an RFID token of an EASY HOME
MAS-S01-09 wireless alarm system using a freely available off-the-shelf
tool and disarm the wireless alarm system in an unauthorized way.



Solution:

SySS GmbH is not aware of a solution for this reported security
vulnerability concerning the tested product version.

For further information please contact the manufacturer.



Disclosure Timeline:

2016-10-05: Vulnerability reported to manufacturer
2016-10-12: E-mail to manufcaturer concerning the status of the reported
security issue
2016-11-23: Public release of security advisory



References:

[1] Product manual of EASY HOME MAS-S01-09 wireless alarm system

http://monolith-shop.de/wp-content/uploads/2016/09/MAS-S01-09_Alarmanlage_Bedienungsanleitung.pdf
[2] SySS Security Advisory SYSS-2016-107

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2016-107.txt
[3] SySS GmbH, SySS Responsible Disclosure Policy
https://www.syss.de/en/news/responsible-disclosure-policy/



Credits:

This security vulnerability was found by Gerhard Klostermeier of SySS
GmbH.

E-Mail: gerhard.klostermeier (at) syss.de
Public Key:
https://www.syss.de/fileadmin/dokumente/PGPKeys/Gerhard_Klostermeier.asc
Key fingerprint = 8A9E 75CC D510 4FF6 8DB5 CC30 3802 3AAB 573E B2E7



Disclaimer:

The information provided in this security advisory is provided "as is"
and without warranty of any kind. Details of this security advisory may
be updated in order to provide as accurate information as possible. The
latest version of this security advisory is available on the SySS Web
site.



Copyright:

Creative Commons - Attribution (by) - Version 3.0
URL: http://creativecommons.org/licenses/by/3.0/deed.en

-BEGIN PGP SIGNATURE-

iQIcBAEBCgAGBQJYNChyAAoJENmkv2o0rU2r4MwQAKTTTRhqNyMi34MxOxUBDAQu
ro3KnFe9C20jiDgnXhLNpwEjsDhqiI4VizScDPQ9EvLE5j5qA0M4SaPn3AZtIiDh
XzKQFJ9Zqoe9COetmx8bEEtCTE1zz5WNy+MNNNqBPGKoIaM54Bcfp9u2W1fQhYW6
m0oTM/y3PPBG7R1xX5el5XPvrqu1Ic2Wr3aT7/MCSApk2cWQic4btERsnhFv4m1N
8bP0Ez9gNsgMRMzxV0vAS1f7AXJLh2tXxdFARhf5S6hnyMxiRpwDeStr6sOUWOTm
iMWIGvptD/kFyJXsg8wLM7h4pqA/Ie9IXe3qETzH83bAEALggb3nT0vFRcPiMeOG

[FD] [SYSS-2016-066] Multi Kon Trade M2B GSM Wireless Alarm System - Missing Protection against Replay Attacks

2016-11-25 Thread Matthias Deeg
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Advisory ID: SYSS-2016-066
Product: M2B GSM Wireless Alarm System
Manufacturer: Multi Kon Trade
Affected Version(s): Unspecified
Tested Version(s): Unspecified
Vulnerability Type: Missing Protection against Replay Attacks
Risk Level: Medium
Solution Status: Open
Manufacturer Notification: 2016-07-05
Solution Date: -
Public Disclosure: 2016-11-23
CVE Reference: Not yet assigned
Author of Advisory: Gerhard Klostermeier, SySS GmbH



Overview:

The M2B GSM wireless alarm system by Multi Kon Trade (MKT) was tested
for possible security issues.

Some features of this alarm system as described by the manufacturer are
(see [1]):

* You will be noticed of any alarm by call or by SMS message.
* The alarm system has a battery which will last 6 to 8 hours in case
  of a blackout.
* You can pair up to 99 devices (sensors, remote control, etc.).
* You do not have to run any cables. Everything is wireless.
* It is possible to trigger alarms in case of fire, even if the
  alarm is disabled.
* It is possible to trigger the alarm with a delay.

Due to an insecure implementation of the used 433 MHz radio
communication, the wireless alarm system M2B GSM is vulnerable to
replay attacks.



Vulnerability Details:

SySS GmbH found out that the radio communication protocol used by the
M2B GSM wireless alarm system and its remote control is not protected
against replay attacks. Therefore, an attacker can record the radio
signal of a wireless remote control, for example using a software
defined radio, when the alarm system is disarmed by its owner, and play
it back at a later time in order to disable the alarm system at will.



Proof of Concept (PoC):

SySS GmbH build a small device that is able to perform replay attacks
against the 433 MHz radio communication of the M2B GSM wireless alarm
system, for example in order to arm and disarm the wireless remote
system in an unauthorized manner.



Solution:

Do not use the 433 MHz remote control to arm or disarm the system.
Instead it is recommended to use the app for iOS and Android smartphones
or to arm and disarm the system manually with the on-board keypad.
(Solution as suggested by the vendor.)



Disclosure Timeline:

2016-07-05: Vulnerability reported to manufacturer
2016-10-13: Response from the vendor with the solution on how to
mitigate the risk
2016-11-23: Public release of security advisory



References:

[1] M2B GSM Wireless Alarm System, Multi Kon Trade
http://multikontrade.de/GSM-Funk-Alarmanlage
[2] PT2260 Remote Control Encoder, Princeton Technology Corp.
http://www.princeton.com.tw/Portals/0/Product/PT2260_4.pdf
[3] SySS Security Advisory SYSS-2016-066

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2016-066.txt
[4] SySS GmbH, SySS Responsible Disclosure Policy
https://www.syss.de/en/news/responsible-disclosure-policy/



Credits:

This security vulnerability was found by Gerhard Klostermeier of SySS
GmbH.

E-Mail: gerhard.klostermeier (at) syss.de
Public Key:
https://www.syss.de/fileadmin/dokumente/PGPKeys/Gerhard_Klostermeier.asc
Key fingerprint = 8A9E 75CC D510 4FF6 8DB5 CC30 3802 3AAB 573E B2E7



Disclaimer:

The information provided in this security advisory is provided "as is"
and without warranty of any kind. Details of this security advisory may
be updated in order to provide as accurate information as possible. The
latest version of this security advisory is available on the SySS Web
site.



Copyright:

Creative Commons - Attribution (by) - Version 3.0
URL: http://creativecommons.org/licenses/by/3.0/deed.en

-BEGIN PGP SIGNATURE-

iQIcBAEBCgAGBQJYNCg9AAoJENmkv2o0rU2rtIMP/3OZVr9igvbqmDaOWyvdQbkS
q5wF+qf48ACbeqzWJHbzp7y5GE+hsvuMvnpLa2JMwg8E+Wqo7P9/TBKJ/F/W8YRb
b2skOQFDuuF3CNG1Uco+hDhPs1FvWVAtOy+YUPPI45IMm+/hOXTRttosns++ZSug
GGW8AOtr1KdNQc4UWm0Xex/d71mpP+a1Y4zKTQXXoIw1i2zSxloX1pv/n+WYyRho
CKOmfaZnzNAakrmHjfQAMYzUk9Ed30H8YA6Y80QwJgns+LqYGu3updNpD8u4cabq
cDC0YOrnyOVuLZgr6itVq6kNu5jPhVkM7ECuTdHWkZOrS1gArti6by5um/xtmO7U
fpBjUNtIxqj6yymkkGZ3HK3nxtvlfJk2zqwwJA+z0j1YyzpZwIHB7EUqe/lsiDVx
Fu1OGURRlbU2ES3LFfKWwG3S4ZQSa7sI6CZFJjMR8m9E3UNSwYLhMisK8FuooY4A
xFOusWlNTj6yPMUe2RXoCUD8lmbOJpPUqIbzfIcK4ek2xGtwWb/9AkmSJhxrFcEg
ktCFV2DzFCwkgfYjrKPx4baOpFWYh+A99YzK8rDqVkWTsOSAV/M9NON3jiN3Ai46

[FD] [SYSS-2016-071] Blaupunkt Smart GSM Alarm SA 2500 Kit - Missing Protection against Replay Attacks

2016-11-25 Thread Matthias Deeg
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Advisory ID: SYSS-2016-071
Product: Smart GSM Alarm SA 2500 Kit
Manufacturer: Blaupunkt
Affected Version(s): v1.0
Tested Version(s): v1.0
Vulnerability Type: Missing Protection against Replay Attacks
Risk Level: Medium
Solution Status: Open
Manufacturer Notification: 2016-07-14
Solution Date: -
Public Disclosure: 2016-11-23
CVE Reference: Not yet assigned
Author of Advisory: Matthias Deeg (SySS GmbH)



Overview:

The Blaupunkt Smart GSM Alarm SA 2500 Kit is a wireless alarm system
with different features.

The manufacturer describes the product as follows (see [1]):

"Home is priceless. Protecting home should be anyone's top priority.
Blaupunkt Smart Alarm Series SA 2500/ SA 2700 Kit offers you an easy
and efficient way to do 'DIY security, DIY protection.' You can set up
a quality security system all by yourself and control/monitor your home
from your smartphone anytime, anywhere."

Due to an insecure implementation of the used 868 MHz radio
communication, the wireless alarm system Blaupunkt Smart GSM Alarm SA
2500 Kit is vulnerable to replay attacks.



Vulnerability Details:

SySS GmbH found out that the radio communication protocol used by the
Blaupunkt Smart GSM Alarm SA 2500 wireless alarm system and its remote
control is not protected against replay attacks. Therefore, an attacker
can record the radio signal of a wireless remote control, for example
using a software-defined radio, when the alarm system is disarmed by its
owner, and play it back at a later time in order to disable the alarm
system at will.



Proof of Concept (PoC):

SySS GmbH could successfully perform a replay attack as described in the
previous section using a software-defined radio and disarm a Blaupunkt
Smart GSM Alarm SA 2500 wireless alarm system in an unauthorized way.



Solution:

SySS GmbH is not aware of a solution for this reported security
vulnerability.

For further information please contact the manufacturer.



Disclosure Timeline:

2016-07-14: Vulnerability reported to manufacturer via e-mail and a
ticket in the Blaupunkt customer service portal
2016-07-14: Received an e-mail from the manufacturer confirming the
ticket
2016-07-15: Manufacturer closed the ticket without any further
notification or solution regarding the reported security
vulnerability
2016-11-23: Public release of security advisory



References:

[1] Blaupunkt Smart GSM Alarm Series SA 2500/SA 2700 KIT
http://www.blaupunkt.com/uploads/tx_ddfproductsbp/2500-2700_39.pdf
[2] SySS Security Advisory SYSS-2016-071

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2016-071.txt
[3] SySS GmbH, SySS Responsible Disclosure Policy
https://www.syss.de/en/news/responsible-disclosure-policy/



Credits:

This security vulnerability was found by Matthias Deeg of SySS GmbH.

E-Mail: matthias.deeg (at) syss.de
Public Key:
https://www.syss.de/fileadmin/dokumente/Materialien/PGPKeys/Matthias_Deeg.asc
Key fingerprint = D1F0 A035 F06C E675 CDB9 0514 D9A4 BF6A 34AD 4DAB



Disclaimer:

The information provided in this security advisory is provided "as is"
and without warranty of any kind. Details of this security advisory may
be updated in order to provide as accurate information as possible. The
latest version of this security advisory is available on the SySS Web
site.



Copyright:

Creative Commons - Attribution (by) - Version 3.0
URL: http://creativecommons.org/licenses/by/3.0/deed.en

-BEGIN PGP SIGNATURE-
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=0Wia
--

[FD] [SYSS-2016-106] EASY HOME Alarmanlagen-Set - Missing Protection against Replay Attacks

2016-11-25 Thread Matthias Deeg
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Advisory ID: SYSS-2016-106
Product: EASY HOME Alarmanlagen-Set
Manufacturer: monolith GmbH
Affected Version(s): Model No. MAS-S01-09
Tested Version(s): Model No. MAS-S01-09
Vulnerability Type: Missing Protection against Replay Attacks
Risk Level: Medium
Solution Status: Open
Manufacturer Notification: 2016-09-26
Solution Date: -
Public Disclosure: 2016-11-23
CVE Reference: Not yet assigned
Author of Advisory: Matthias Deeg (SySS GmbH)



Overview:

The EASY HOME MAS-S01-09 is a wireless alarm system with different
features sold by ALDI SÜD.

Some of the features as described in the German product manual are
(see [1]):

"
- - Alarmanlagen-Set mit drahtlosen Sensoren und Mobilfunk-Anbindung
- - SOS-Modus, Stiller Alarm, Überwachungs- und Intercom-Funktion
- - Integrierte Quad-Band Mobilfunkeinheit für GSM-Netze im 850 / 900 /
  1800 / 1900 MHz-Bereich
- - Alarmbenachrichtigung auf externe Telefone
- - Eingebaute Sirene (ca. 90 dB), inkl. Anschluss für externe Sirene
- - Unterstützung für bis zu 98 kabellosen Sensoren / bis zu 4
kabelgebundene Sensoren
- - Stromausfallsicherung der Basiseinheit durch 4 x AAA
  Alkaline-Batterien
- - Fernbedienbar per Telefon
"

Due to an insecure implementation of the used 433 MHz radio
communication, the EASY HOME MAS-S01-09 wireless alarm system is
vulnerable to replay attacks.



Vulnerability Details:

SySS GmbH found out that the radio communication protocol used by the
EASY HOME  MAS-S01-09 wireless alarm system and its remote control is
not protected against replay attacks. Therefore, an attacker can record
the 433 MHz radio signal of a wireless remote control, for example using
a software-defined radio, when the alarm system is disarmed by its
owner, and play it back at a later time in order to disable the alarm
system at will.



Proof of Concept (PoC):

SySS GmbH could successfully perform a replay attack as described in the
previous section using a software-defined radio and disarm an EASY HOME
MAS-S01-09 wireless alarm system in an unauthorized way.



Solution:

SySS GmbH is not aware of a solution for this reported security
vulnerability concerning the tested product version.

For further information please contact the manufacturer.



Disclosure Timeline:

2016-09-26: Vulnerability reported to manufacturer
2016-09-30: Manufacturer responds to reported security issue and that
the information will be integrated in the next product
version
2016-09-30: E-mail to manufacturer concerning a security advice in the
product manual
2016-10-04: Response concerning security advice in product manual
2016-11-23: Public release of security advisory



References:

[1] Product manual of EASY HOME MAS-S01-09 wireless alarm system

http://monolith-shop.de/wp-content/uploads/2016/09/MAS-S01-09_Alarmanlage_Bedienungsanleitung.pdf
[2] SySS Security Advisory SYSS-2016-106

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2016-106.txt
[3] SySS GmbH, SySS Responsible Disclosure Policy
https://www.syss.de/en/news/responsible-disclosure-policy/



Credits:

This security vulnerability was found by Matthias Deeg of SySS GmbH.

E-Mail: matthias.deeg (at) syss.de
Public Key:
https://www.syss.de/fileadmin/dokumente/Materialien/PGPKeys/Matthias_Deeg.asc
Key fingerprint = D1F0 A035 F06C E675 CDB9 0514 D9A4 BF6A 34AD 4DAB



Disclaimer:

The information provided in this security advisory is provided "as is"
and without warranty of any kind. Details of this security advisory may
be updated in order to provide as accurate information as possible. The
latest version of this security advisory is available on the SySS Web
site.



Copyright:

Creative Commons - Attribution (by) - Version 3.0
URL: http://creativecommons.org/licenses/by/3.0/deed.en

-BEGIN PGP SIGNATURE-

iQIcBAEBCgAGBQJYNChqAAoJENmkv2o0rU2rznUP/R2Pg/9Dkc3GPJDKGd1HTaSo
AC/qluqMjGs8FcPj03WPewT2MlTRBLdkEsgP9kUluC8ohvPS6ybBsogTjcNPQ+vp
Qu0gqbhPohTv2VcRlMFAlLycuv2jG56OZ9H6hyNxhCTb8rY8RUI1Ox8R+KQEEFTW
fASLsoGt6aRRucHSQW0v/W8MfAVM4oo7JGTt5NG5aJ6Fl7pzJJ2a31KZ/lFnAXo3
4WJf5z3WbiHVb9nHs9d95+RrbCQWOAi34VRvlENlc6Sw6dYQ6QvaC0L+SA7CKhbe
z0qy0xiz0H14ISnX+7MeVQzvw/MFCA75qRljMoTNVxM3Sm8jxEh7KxYIXL9/KdY6
e76zGYo70YUYRq5lvwI9YRtcTWELzEQ5kanD0W0f8BnrT76l3DDFiCprK4By8dwP
rxJKj

[FD] [SYSS-2016-068] Fujitsu Wireless Keyboard Set LX901 - Cryptographic Issues (CWE-310), Missing Protection against Replay Attacks

2016-10-11 Thread Matthias Deeg
Advisory ID: SYSS-2016-068
Product: Wireless Keyboard Set LX901
Manufacturer: Fujitsu
Affected Version(s): Model No. GK900
Tested Version(s): Model No. GK900
Vulnerability Type: Cryptographic Issues (CWE-310)
Missing Protection against Replay Attacks
Risk Level: Medium
Solution Status: Open
Manufacturer Notification: 2016-07-07
Solution Date: -
Public Disclosure: 2016-10-05
CVE Reference: Not yet assigned
Authors of Advisory: Matthias Deeg and Gerhard Klostermeier (SySS GmbH)



Overview:

Fujitsu Wireless Keyboard Set LX901 is a wireless desktop set consisting
of a mouse and a keyboard.

The manufacturer describes the product as follows (see [1]):

"The Wireless Keyboard LX901 is a top of the line desktop solution
for lifestyle orientated customers, who want only the best for their
desk. This superb keyboard set offers ambitious users more functions,
security and better features than a conventional interface device. It
even includes 2.4 GHz technology and 128 AES encryption for security."

Due to an insecure implementation of the encrypted data communication,
the wireless keyboard LX901 is vulnerable to replay attacks.



Vulnerability Details:

The SySS GmbH found out that the wireless keyboard Fujitsu LX901 is
prone to replay attacks.

An attacker can sniff the AES-encrypted data packets of the 2.4 GHz
radio communication sent by the keyboard to the receiver (USB dongle)
and replay the recorded communication data at will causing the same
effect as the original data communication.

A replay attack against the keyboard can, for example, be used to gain
unauthorized access to a computer system that is operated with a
vulnerable Fujitsu LX901 keyboard. In this attack scenario, an attacker
records the radio communication during a password-based user
authentication of his or her victim, for instance during a login to the
operating system or during unlocking a screen lock. At an opportune
moment when the victim's computer system is unattended, the attacker
approaches the victim's computer and replays the previously recorded
AES-encrypted data communication for the password-based user
authentication and thereby gets unauthorized access to the victim's
system.



Proof of Concept (PoC):

The SySS GmbH could successfully perform a replay attack as described
in the previous section using a software-defined radio in combination
with the software tool GNU Radio Companion.



Solution:

According to information from the manufacturer Fujitsu, the reported
security issue will currently not be fixed in affected products.

The written statement in German from Fujitsu regarding this security
issue is as follows:

"Vielen Dank für Ihre Informationen zu unserer Funktastatur. Wie Ihnen
bereits mitgeteilt, halten wir das von Ihnen beschriebene
Angriffsszenario bei unserer Tastatur aufgrund des verwendeten
Funkprotokolls unter realen Bedingungen für nicht so einfach
durchführbar. Wie erwähnt, verkaufen wir mit unserer Tastatur keine
Sicherheitslösung, sondern eine Komfortlösung (ohne gravierende
Sicherheitsnachteile wie bei unverschlüsselten Wireless-Tastaturen).
In einem bereits geplanten Nachfolgeprodukt werden alle neuen
Erkenntnisse zur sicheren Datenübertragung bei Funktastaturen
einfließen."

The English translation of this statement is as follows:

"Thank you very much for your information about our wireless keyboard.
As we have already pointed out, we believe that the described scenario
is not easy to perform under real conditions due to the radio protocol
used. As mentioned, our product is not destined to sell security, but
convenience in the first place (without the security drawbacks of
unencrypted wireless keyboards). Any new information and insights will
be incorporated into the already planned successor product."



Disclosure Timeline:

2016-07-07: Vulnerability reported to manufacturer
2016-07-08: Manufacturer acknowledges e-mail with SySS security advisory
2016-08-02: E-mail from manufacturer requesting further information
2016-08-04: Provided further information to manufacturer via e-mail
2016-08-05: E-mail from manufacturer with further questions
2016-08-08: E-mail to manufacturer with answers to open questions
2016-08-12: E-mail from manufacturer with statement regarding the
reported security issue
2016-10-05: Public release of the security advisory



References:

[1] Product website for Fujitsu Wireless Keyboard Set

http://www.fujitsu.com/global/products/computing/peripheral/accessories/input-devices/keyboards/w

[FD] [SYSS-2016-033] Microsoft Wireless Desktop 2000 - Insufficient Protection of Code (Firmware) and Data (Cryptographic Key)

2016-10-11 Thread Matthias Deeg
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Advisory ID: SYSS-2016-033
Product: Microsoft Wireless Desktop 2000
Manufacturer: Microsoft
Affected Version(s): Ver. A
Tested Version(s): Ver. A
Vulnerability Type: Insufficient Protection of Code (Firmware) and
Data (Cryptographic Key)
Risk Level: Medium
Solution Status: Open
Manufacturer Notification: 2016-04-22
Solution Date: -
Public Disclosure: 2016-10-05
CVE Reference: Not yet assigned
Authors of Advisory: Gerhard Klostermeier and Matthias Deeg (SySS GmbH)



Overview:

Microsoft Wireless Desktop 2000 is a wireless desktop set consisting of
a mouse and a keyboard.

The manufacturer describes the product as follows (see [1]):

"This keyboard features Advanced Encryption Standard (AES) technology,
which is designed to help protect your information by encrypting your
keystrokes. Each keyboard is permanently paired with its receiver at
the factory - no key information is ever shared over the air."

Due to the insufficient protection of the flash memory of the keyboard
and of the USB dongle, an attacker with physical access has read and
write access to the firmware and the used cryptographic key.



Vulnerability Details:

The SySS GmbH found out that the embedded flash memory of the wireless
keyboard Microsoft Wireless Desktop 2000  and of the corresponding USB
dongle can be read and written via the SPI interface of the used
transceivers with an embedded microcontroller nRF24LE1H (keyboard) and
nRF24LU1+ (USB dongle) as the flash memory is not protected by the
offered read back protection feature (RDISMB - Read DISable Main Block).

Thus, an attacker with physical access to the keyboard or the USB
dongle can simply read and write the SPI-addressable code and data
flash memory. Due to the use of nRF24 transceiver versions with one-time
programmable memory, write access is limited in such a way that a set
1 bit can be changed to a 0 bit but not vice versa.

The AES cryptographic key used by the Microsoft Wireless Desktop 2000
keyboard and the corresponding USB dongle is for both devices accessible
via the SPI interface.

By having read and write access to the code and data flash memory, an
attacker can either extract the cryptographic key, for instance to
perform further attacks against the wireless communication, or modify
the firmware or the cryptographic key in a limited way due to the
used one-time programmable memory.



Proof of Concept (PoC):

The SySS GmbH could successfully read the contents of the code and data
flash memory of the Microsoft Wireless Desktop 2000 keyboard and of the
USB dongle using the hardware tool Bus Pirate [3] in combination with
the software tool nrfprog [4].



Solution:

The SySS GmbH is not aware of a solution for this reported security
vulnerability.

For further information please contact the manufacturer.



Disclosure Timeline:

2016-04-22: Vulnerability reported to manufacturer
2016-04-23: Manufacturer acknowledges e-mail with SySS security advisory
2016-06-06: E-mail to manufacturer according current status
2016-06-27: Another e-mail to manufacturer according current status
2016-06-27: E-mail from manufacturer requesting further information
2016-06-28: Provided further information and PoC software tool
2016-07-07: E-mail from manufacturer with further information and
question about intended disclosure
2016-07-08: E-mail to manufacturer concerning the planned responsible
disclosure
2016-08-04: E-mail from manufacturer concerning limitations of actual
attacks
2016-10-05: Public release of the security advisory



References:

[1] Product website for Microsoft Wireless Desktop 2000

https://www.microsoft.com/accessories/en-us/products/keyboards/wireless-desktop-2000/m7j-1
[2] Website of Bus Pirate hardware tool
http://dangerousprototypes.com/docs/Bus_Pirate
[3] nrfprog Github repository
https://github.com/nekromant/nrfprog
[4] SySS Security Advisory SYSS-2016-033

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2016-033.txt
[5] SySS Responsible Disclosure Policy
https://www.syss.de/en/responsible-disclosure-policy/



Credits:

This security vulnerability was found by Gerhard Klostermeier and
Matthias Deeg of the SySS GmbH.

E-Mail: gerhard.klostermeier (at) syss.de
Public Key:
https://www.syss.de/fileadmin/dokumente/PGPKeys/Gerhard_Klostermeier.asc
Key fingerprint = 8A9E 75CC D510 4FF6 8DB5 CC30 3802 3AAB 573E B2

[FD] [SYSS-2016-043] Microsoft Wireless Desktop 2000 - Cryptographic Issues (CWE-310), Insufficient Protection against Replay Attacks

2016-10-11 Thread Matthias Deeg
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Advisory ID: SYSS-2016-043
Product: Microsoft Wireless Desktop 2000
Manufacturer: Microsoft
Affected Version(s): Ver. A
Tested Version(s): Ver. A
Vulnerability Type: Cryptographic Issues (CWE-310)
Insufficient Protection against Replay Attacks
Risk Level: Medium
Solution Status: Open
Manufacturer Notification: 2016-05-19
Solution Date: -
Public Disclosure: 2016-10-05
CVE Reference: Not yet assigned
Authors of Advisory: Matthias Deeg and Gerhard Klostermeier (SySS GmbH)



Overview:

Microsoft Wireless Desktop 2000 is a wireless desktop set consisting of
a mouse and a keyboard.

The manufacturer describes the product as follows (see [1]):

"This keyboard features Advanced Encryption Standard (AES) technology,
which is designed to help protect your information by encrypting your
keystrokes. Each keyboard is permanently paired with its receiver at
the factory - no key information is ever shared over the air."

Due to an insecure implementation of the encrypted data communication,
the wireless keyboard Microsoft Wireless Desktop 2000 is prone to replay
attacks with certain restrictions.



Vulnerability Details:

The SySS GmbH found out that the Microsoft Wireless Desktop 2000
keyboard is prone to replay attacks with some limitations.

An attacker can sniff the AES-encrypted data packets of the 2.4 GHz
radio communication sent by the keyboard to the receiver (USB dongle)
and replay the recorded communication data causing the same effect as
the original data communication.

According to test results of the SySS GmbH, the Microsoft Wireless
Desktop 2000 keyboard and its USB dongle have implemented a replay
protection based on an incrementing packet counter. But the used
window for valid packet counter values is large enough to perform
a replay attack if there were not too many data packets caused by
further keystrokes between the attacker's recording and the playback.

A replay attack against the keyboard can, for example, be used to gain
unauthorized access to a computer system that is operated with a
vulnerable Microsoft Wireless Desktop 2000 keyboard. In this attack
scenario, an attacker records the radio communication during a
password-based user authentication of his or her victim, for instance
during a login to the operating system or during unlocking a screen
lock. At an opportune moment when the victim's computer system is
unattended, the attacker approaches the victim's computer and replays
the previously recorded AES-encrypted data communication for the
password-based user authentication and by this gets unauthorized access
to the victim's system.



Proof of Concept (PoC):

The SySS GmbH could successfully perform a replay attack as described
in the previous section using the USB radio dongle Crazyradio PA (see
[2]) and a simple proof-of-concept software tool.

The following output exemplarily illustrates a replay attack with the
recorded data packets for the word "test".

# python simple_replay.py
Simple nRF24 Replay Tool v0.1 by Matthias Deeg - SySS GmbH (c) 2016
[*] Configure radio
[*] Start recording. Press <CTRL+C> to stop recording ...
[+] Received data: 099816019c49e8e3d7004fb2c6d1c999c5cdd0d6
[+] Received data: 099816019c49e8e3d7004fb2c6d1c999c5cdd0d6
[+] Received data: 083816016234008e
[+] Received data: 083816016234008e
[+] Received data: 099816016ae20e05e28d725888c4ede685f918e7
[+] Received data: 099816016ae20e05e28d725888c4ede685f918e7
[+] Received data: 09981601896c8f035a7a800fcf0a5ba58be156e4
[+] Received data: 09981601896c8f035a7a800fcf0a5ba58be156e4
[+] Received data: 0838160164340088
[+] Received data: 0838160164340088
[+] Received data: 099816019703529705956290664c0cda94ab28b6
[+] Received data: 099816019703529705956290664c0cda94ab28b6
[+] Received data: 0998160168690f3817261c9e068577dd450a245a
[+] Received data: 0998160168690f3817261c9e068577dd450a245a
[+] Received data: 083816016634008a
[+] Received data: 083816016634008a
[+] Received data: 083816016634008a
[+] Received data: 083816016634008a
[+] Received data: 09981601653e89ebf7499ce2b7f962e9da48c5f4
[+] Received data: 09981601653e89ebf7499ce2b7f962e9da48c5f4
[+] Received data: 09981601f7612ae3b196b5767ab0a4dd615651e2
[+] Received data: 0838160168340084
[+] Received data: 0838160168340084
[+] Received data: 09981601db67b32134efa3fefd8b01efb124581d
[+] Received data: 09981601db67b32134efa3fefd8b01efb124581d
^C
[*] Stop recording
[*] Press  to replay the recorded data packets or <CTRL+C> to
quit ...
[+] Send data: 099816019c49e8e3d7004fb2c6d1c999c5cdd0d6
[+] Send data: 099816019c49e8e3d7004fb2c6d1c999c5cdd0d6
[+] Send data: 083816016234008e
[+] Send data: 083816016234008e
[+] Send data: 099816016ae20e05e28d72

[FD] [SYSS-2016-043] Microsoft Wireless Desktop 2000 - Cryptographic Issues (CWE-310), Insufficient Protection against Replay Attacks

2016-10-11 Thread Matthias Deeg
Advisory ID: SYSS-2016-043
Product: Microsoft Wireless Desktop 2000
Manufacturer: Microsoft
Affected Version(s): Ver. A
Tested Version(s): Ver. A
Vulnerability Type: Cryptographic Issues (CWE-310)
Insufficient Protection against Replay Attacks
Risk Level: Medium
Solution Status: Open
Manufacturer Notification: 2016-05-19
Solution Date: -
Public Disclosure: 2016-10-05
CVE Reference: Not yet assigned
Authors of Advisory: Matthias Deeg and Gerhard Klostermeier (SySS GmbH)



Overview:

Microsoft Wireless Desktop 2000 is a wireless desktop set consisting of
a mouse and a keyboard.

The manufacturer describes the product as follows (see [1]):

"This keyboard features Advanced Encryption Standard (AES) technology,
which is designed to help protect your information by encrypting your
keystrokes. Each keyboard is permanently paired with its receiver at
the factory - no key information is ever shared over the air."

Due to an insecure implementation of the encrypted data communication,
the wireless keyboard Microsoft Wireless Desktop 2000 is prone to replay
attacks with certain restrictions.



Vulnerability Details:

The SySS GmbH found out that the Microsoft Wireless Desktop 2000
keyboard is prone to replay attacks with some limitations.

An attacker can sniff the AES-encrypted data packets of the 2.4 GHz
radio communication sent by the keyboard to the receiver (USB dongle)
and replay the recorded communication data causing the same effect as
the original data communication.

According to test results of the SySS GmbH, the Microsoft Wireless
Desktop 2000 keyboard and its USB dongle have implemented a replay
protection based on an incrementing packet counter. But the used
window for valid packet counter values is large enough to perform
a replay attack if there were not too many data packets caused by
further keystrokes between the attacker's recording and the playback.

A replay attack against the keyboard can, for example, be used to gain
unauthorized access to a computer system that is operated with a
vulnerable Microsoft Wireless Desktop 2000 keyboard. In this attack
scenario, an attacker records the radio communication during a
password-based user authentication of his or her victim, for instance
during a login to the operating system or during unlocking a screen
lock. At an opportune moment when the victim's computer system is
unattended, the attacker approaches the victim's computer and replays
the previously recorded AES-encrypted data communication for the
password-based user authentication and by this gets unauthorized access
to the victim's system.



Proof of Concept (PoC):

The SySS GmbH could successfully perform a replay attack as described
in the previous section using the USB radio dongle Crazyradio PA (see
[2]) and a simple proof-of-concept software tool.

The following output exemplarily illustrates a replay attack with the
recorded data packets for the word "test".

# python simple_replay.py
Simple nRF24 Replay Tool v0.1 by Matthias Deeg - SySS GmbH (c) 2016
[*] Configure radio
[*] Start recording. Press <CTRL+C> to stop recording ...
[+] Received data: 099816019c49e8e3d7004fb2c6d1c999c5cdd0d6
[+] Received data: 099816019c49e8e3d7004fb2c6d1c999c5cdd0d6
[+] Received data: 083816016234008e
[+] Received data: 083816016234008e
[+] Received data: 099816016ae20e05e28d725888c4ede685f918e7
[+] Received data: 099816016ae20e05e28d725888c4ede685f918e7
[+] Received data: 09981601896c8f035a7a800fcf0a5ba58be156e4
[+] Received data: 09981601896c8f035a7a800fcf0a5ba58be156e4
[+] Received data: 0838160164340088
[+] Received data: 0838160164340088
[+] Received data: 099816019703529705956290664c0cda94ab28b6
[+] Received data: 099816019703529705956290664c0cda94ab28b6
[+] Received data: 0998160168690f3817261c9e068577dd450a245a
[+] Received data: 0998160168690f3817261c9e068577dd450a245a
[+] Received data: 083816016634008a
[+] Received data: 083816016634008a
[+] Received data: 083816016634008a
[+] Received data: 083816016634008a
[+] Received data: 09981601653e89ebf7499ce2b7f962e9da48c5f4
[+] Received data: 09981601653e89ebf7499ce2b7f962e9da48c5f4
[+] Received data: 09981601f7612ae3b196b5767ab0a4dd615651e2
[+] Received data: 0838160168340084
[+] Received data: 0838160168340084
[+] Received data: 09981601db67b32134efa3fefd8b01efb124581d
[+] Received data: 09981601db67b32134efa3fefd8b01efb124581d
^C
[*] Stop recording
[*] Press  to replay the recorded data packets or <CTRL+C> to
quit ...
[+] Send data: 099816019c49e8e3d7004fb2c6d1c999c5cdd0d6
[+] Send data: 099816019c49e8e3d7004fb2c6d1c999c5cdd0d6
[+] Send data: 083816016234008e
[+] Send data: 083816016234008e
[+] Send data: 099816016ae20e05e28d725888c4ede685f918e7
[+] Send data: 099816016ae20e05e28d72

[FD] [SYSS-2016-074] Logitech Wireless Presenter R400 - Insufficient Verification of Data Authenticity (CWE-345), Keystroke Injection Vulnerability

2016-10-12 Thread Matthias Deeg
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Advisory ID: SYSS-2016-074
Product: Wireless Presenter R400
Manufacturer: Logitech
Affected Version(s): Model R-R0008
Tested Version(s): Model R-R0008
Vulnerability Type: Insufficient Verification of Data Authenticity (CWE-345)
Keystroke Injection Vulnerability
Risk Level: High
Solution Status: Open
Manufacturer Notification: 2016-08-12
Solution Date: -
Public Disclosure: 2016-10-12
CVE Reference: Not yet assigned
Authors of Advisory: Matthias Deeg (SySS GmbH)



Overview:

Logitech R400 is a wireless presenter using 2.4 GHz radio communication.

The manufacturer describes the product as follows (see [1]):

"Intuitive controls and red laser pointer make presentations a snap,
even in the darkest auditoriums."

Due to unencrypted and unauthenticated data communication, the wireless
presenter Logitech R400 is prone to keystroke injection attacks.



Vulnerability Details:

The SySS GmbH found out that the wireless presenter Logitech R400 is
vulnerable to keystroke injection attacks.

An attacker can analyze the unencrypted and unauthenticated  data
packets of the 2.4 GHz radio communication sent by the wireless
presenter to the receiver (USB dongle) in order to learn the used
protocol. By knowing the used data protocol, it is possible to inject
packets in the data communication that are actually interpreted as
keystrokes by the receiver on the target system.

Thus, an attacker is able to send arbitrary keystrokes to a victim's
computer system, for example in order to install malware when the target
system is unattended. In this way, an attacker can remotely take control
over the victim's computer that is operated with an affected receiver of
a Logitech R400 wireless presenter.



Proof of Concept (PoC):

The SySS GmbH could successfully perform keystroke injection attacks
against the wireless presenter Logitech R400 using an in-house developed
software tool in combination with the USB radio dongle Crazyradio PA
and the nrf-research-firmware by Bastille Networks Internet Security
(see [2] and [3]).

The following output of the developed proof-of-concept software tool
illustrates a successful attack:

# python logitech_presenter.py -a 77:E3:96:AC:07
_  __ ___  _  _ _  _  _
   |  __ \|  |__ \| || |   |  __ \| || |
  _ __ | |__) | |__ ) | || |_  | |__) | | __ _ _   _ ___  ___| |_
 | '_ \|  _  /|  __|   / /|__   _| |  ___/| |/ _` | | | / __|/ _ \ __|
 | | | | | \ \| | / /_   | |   | || | (_| | |_| \__ \  __/ |_
 |_| |_|_|  \_\_|||  |_|   |_||_|\__,_|\__, |___/\___|\__|
__/ |
   |___/
Logitech Wireless Presenter Attack Tool v1.0 by Matthias Deeg - SySS
GmbH (c) 2016
[*] Configure nRF24 radio
[*] Scanning for Logitech wireless presenter ...
[+] Found nRF24 device with address 77:E3:96:AC:07 on channel 32
[*] Press <CTRL+C> to start keystroke injection
^C
[*] Start keystroke injection ...
[*] Done.



Solution:

The SySS GmbH is not aware of a solution for this reported security
vulnerability.

For further information please contact the manufacturer.



Disclosure Timeline:

2016-08-12: Vulnerability reported to manufacturer
2016-10-12: Public release of the security advisory



References:

[1] Product website for Logitech R400
http://www.logitech.com/en-us/product/wireless-presenter-r400
[2] Product website for Crazyradio PA
https://www.bitcraze.io/crazyradio-pa/
[3] Bastille's nRF24 research firmware and tools
https://github.com/BastilleResearch/nrf-research-firmware
[4] SySS Security Advisory SYSS-2016-074

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2016-074.txt
[5] SySS Responsible Disclosure Policy
https://www.syss.de/en/responsible-disclosure-policy/



Credits:

This security vulnerability was found by Matthias Deeg of the SySS GmbH.

E-Mail: matthias.deeg (at) syss.de
Public Key:
https://www.syss.de/fileadmin/dokumente/Materialien/PGPKeys/Matthias_Deeg.asc
Key fingerprint = D1F0 A035 F06C E675 CDB9 0514 D9A4 BF6A 34AD 4DAB



Disclaimer:

The information provided in this security advisory is provided "as is"
and without warranty of any kind. Details of this security advisory may
be updated in order to provi

[FD] [SYSS-2016-075] Targus Multimedia Presentation Remote - Insufficient Verification of Data Authenticity (CWE-345), Mouse Spoofing Attack

2016-10-12 Thread Matthias Deeg
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Advisory ID: SYSS-2016-075
Product: Multimedia Presentation Remote
Manufacturer: Targus
Affected Version(s): Model AMP09-EU
Tested Version(s): Model AMP09-EU
Vulnerability Type: Insufficient Verification of Data Authenticity (CWE-345)
Mouse Spoofing Attack
Risk Level: Medium
Solution Status: Open
Manufacturer Notification: 2016-08-16
Solution Date: -
Public Disclosure: 2016-10-12
CVE Reference: Not yet assigned
Authors of Advisory: Matthias Deeg (SySS GmbH)



Overview:

Targus Multimedia Presentation Remote is a wireless presenter using 2.4
GHz radio communication.

The manufacturer describes the product as follows (see [1]):

"Don't fumble around with wires or fuss over the computer; present like
a professional and control your computer remotely, using just one
device - the Targus Multi Media Presentation Remote with Cursor Control.
Thanks to the remote's 2.4GHz cordless technology, you can access
programmes, launch the internet, adjust volumes and play music and
videos, all from up to 15 metres away."

Due to unencrypted and unauthenticated mouse data communication, the
wireless presenter Targus Multimedia Presentation Remote is vulnerable
to mouse spoofing attacks.



Vulnerability Details:

The SySS GmbH found out that the wireless presenter Targus Multimedia
Presentation Remote is prone to mouse spoofing attacks, as the
cursor control data communication is unencrypted and unauthenticated.

An attacker can analyze the unencrypted cursor control data packets of
the 2.4 GHz radio communication sent by the wireless presenter to the
receiver (USB dongle) in order to learn the used protocol. By knowing
the used mouse data protocol, it is possible to spoof mouse actions
like mouse movements or mouse clicks by sending forged data packets.

Thus, an attacker is able to remotely control the mouse pointer of a
target system that is operated with the wireless presenter Targus
Multimedia Presentation Remote. If the graphical user interface of the
victim's system is unlocked, an attacker can for example send a list of
mouse actions that start the virtual on-screen keyboard of the operating
system and execute arbitrary commands in the context of the currently
logged in user, for instance a download and execute attack vector.

As the attacker may not have an unobstructed view to the target system's
screen and may not know the used operating system, the screen
resolution, or the current mouse settings, this kind mouse spoofing
attack is based on heuristics. But concerning an unlocked and unattended
system, an attacker can simply try different attack vectors for
different target system configurations sequentially.



Proof of Concept (PoC):

The SySS GmbH could successfully perform mouse spoofing attacks against
a target system operated with the wireless presenter Targus Multimedia
Presentation Remote using an in-house developed software tool in
combination with the USB radio dongle Crazyradio PA and the
nrf-research-firmware by Bastille Networks Internet Security (see [2]
and [3]).

A proof-of-concept mouse spoofing attack that also applies to the
wireless presenter Targus Multimedia Presentation Remote resulting in
remote code execution using the SySS software tool Radioactive Mouse is
demonstrated in a video (see [4]).



Solution:

The SySS GmbH is not aware of a solution for this reported security
vulnerability.

For further information please contact the manufacturer.



Disclosure Timeline:

2016-08-16: Vulnerability reported to manufacturer
2016-08-16: Manufacturer acknowledges e-mail with SySS security advisory
2016-10-12: Public release of the security advisory



References:

[1] Product website for Targus Multimedia Presentation Remote
http://targus.com/uk/multimedia-presentation-remote-amp09eu
[2] Product website for Crazyradio PA
https://www.bitcraze.io/crazyradio-pa/
[3] Bastille's nRF24 research firmware and tools
https://github.com/BastilleResearch/nrf-research-firmware
[4] SySS Proof-of-Concept Mouse Spoofing Attack Video
https://www.youtube.com/watch?v=PkR8EODee44
[5] SySS Security Advisory SYSS-2016-075

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2016-075.txt
[6] SySS Responsible Disclosure Policy
https://www.syss.de/en/responsible-disclosure-policy/



Credits:

This security vulnerability was found by Matthias Deeg of the SySS GmbH.

E-Mail: matthias.deeg (at) syss.de
Public 

[FD] [SYSS-2015-035] Password Safe and Repository Enterprise v7.4.4 - SQL Injection (CWE-89)

2017-04-11 Thread Matthias Deeg
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Advisory ID: SYSS-2015-035
Product(s): Password Safe and Repository Enterprise
Manufacturer: MATESO GmbH
Affected Version(s): 7.4.4 Build 2247
Tested Version(s): 7.4.4 Build 2247
Vulnerability Type: Violation of Secure Design Principles (CWE-657)
SQL Injection (CWE-89)
Risk Level: High
Solution Status: Fixed
Manufacturer Notification: 2015-07-09
Solution Date: 2016-10-18
Public Disclosure: 2017-04-10
CVE Reference: Not yet assigned
Author of Advisory: Matthias Deeg (SySS GmbH)

~~~

Overview:

Password Safe and Repository Enterprise is a password management
software for companies with many features.

The vendor MATESO GmbH describes the product as follows (see [1]):

"Manage your passwords in the company according to your security needs!
Features such as password policies, multi-eyes principle, workflow and
task system makes management productive and safe.

The integrated rights management system with data transfer option and
automatic synchronization with Active Directory ensures that your
employees can only access data which they are entitled to."

~~~

Vulnerability Details:

SySS GmbH found out that the password management software Password Safe
and Repository Enterprise violates secure design principles and
insufficiently implements user input validation concerning database
access via SQL statements.

These vulnerabilities enable an attacker to manipulate SQL statements
on the client side using a "malicious client" in order to perform
privilege escalation attacks or to gain authorized read and write
access to other user's data.

Different SQL statements that are created on the client side in the
context of different functionalities of the password management client
software can be manipulated and thus exploited for such attacks.

These vulnerabilities both affect the online and the offline mode of the
password management software, but there may be different requirements
for a successful exploitation like valid user credentials.



Proof of Concept (PoC):

1) Privilege escalation by retrieving information of another user

In order to perform a privilege escalation attack in the online mode
of the password management software Password Safe and Repository
Enterprise from the perspective of an authorized low-privileged user,
the parameter "ID" of the following SQL statement simply has to be
manipulated:

SELECT * FROM tdUsers WHERE ID=

This SQL statement is used by the client software in the online mode for
retrieving user information from the server system after a successful
user login. If the parameter "ID" is set to a valid user ID of another
existing user, for example the built-in administrator account who has
usually the user ID 1, the application can be used with the privileges
of the user with the chosen user ID.


2) Privilege escalation by setting new user rights

Another possibility to perform a privilege escalation attack in the
online mode from the perspective of a low-privileged user is to
manipulate the following SQL statement that is used to update the
user's last login date:

UPDATE tdUsers SET LastLogin = julianday(''), ChangeDate =
julianday('') WHERE ID = 

By replacing this UPDATE SQL statement by the following one, the user
rights of an arbitrary user can be modified, for example by setting
all available rights:

UPDATE tdUsers SET UserRights =
'11' WHERE ID = 



Solution:

The MATESO GmbH released the new software version Password Safe and
Repository Enterprise 8 that is not affected by the described security
issues.

Please contact the manufacturer for further information or support.



Disclosure Timeline:

2015-07-09: Vulnerability reported to manufacturer
2015-07-09: Manufacturer acknowledges e-mail with SySS security advisory

2015-07-30: Scheduling of the publication date in agreement with the
manufacturer
2015-10-02: Rescheduling of the publication date in agreement with the
manufacturer
2016-10-18: Manufacturer presents new software version with fixed
security issues
2017-04-10: Public release of security advisory



References:

[1] Product website for Password Safe and Repository Enterprise
http://www.passwordsafe.de/en/products/business/enterprise-edition.html
[2] SySS Security Advisory SYSS-2015-035

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2015-035.txt
[3] SySS Responsible Disclosure Policy
https://www.syss.

[FD] [SYSS-2015-036] Password Safe and Repository Enterprise v7.4.4 - Violation of Secure Design Principles (CWE-657)

2017-04-11 Thread Matthias Deeg
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Advisory ID: SYSS-2015-036
Product(s): Password Safe and Repository Enterprise
Manufacturer: MATESO GmbH
Affected Version(s): 7.4.4 Build 2247
Tested Version(s): 7.4.4 Build 2247
Vulnerability Type: Credentials Management (CWE-255)
Violation of Secure Design Principles (CWE-657)
Risk Level: High
Solution Status: Fixed
Manufacturer Notification: 2015-07-09
Solution Date: 2016-10-18
Public Disclosure: 2017-04-10
CVE Reference: Not yet assigned
Author of Advisory: Matthias Deeg (SySS GmbH)

~~~

Overview:

Password Safe and Repository Enterprise is a password management
software for companies with many features.

The vendor MATESO GmbH describes the product as follows (see [1]):

"Manage your passwords in the company according to your security needs!
Features such as password policies, multi-eyes principle, workflow and
task system makes management productive and safe.

The integrated rights management system with data transfer option and
automatic synchronization with Active Directory ensures that your
employees can only access data which they are entitled to."

~~~

Vulnerability Details:

SySS GmbH found out that synchronized databases (offline databases)
created by a specific user also contain sensitive data of other users,
for example login credentials.

The password information of other users are stored as raw, unsalted MD5
hash values in the database table tdUsers (see SYSS-2015-037).

Thus, by having access to an offline database, it is possible to access
password information of other users, for example the MD5 password hash
of the built-in administrator account. This password information may be
recovered during password guessing attacks and used for accessing
foreign user data in an unauthorized way or for performing privilege
escalation attacks in the online mode.



Proof of Concept (PoC):

In the offline mode of the password management software Password Safe
and Repository, it is possible to manipulate SQL statements due to
the violation of secure design principles and SQL injection
vulnerabilities (see SYSS-2015-035).

By using the following SQL statement, user information of all users
unnecessarily stored in the database table tdUsers can be retrieved from
an offline database and extracted from memory of the password management
software, for example by using a modified client software:

SELECT * FROM tdUsers



Solution:

The MATESO GmbH released the new software version Password Safe and
Repository Enterprise 8 that is not affected by the described security
issues.

Please contact the manufacturer for further information or support.



Disclosure Timeline:

2015-07-09: Vulnerability reported to manufacturer
2015-07-09: Manufacturer acknowledges e-mail with SySS security advisory

2015-07-30: Scheduling of the publication date in agreement with the
manufacturer
2015-10-02: Rescheduling of the publication date in agreement with the
manufacturer
2016-10-18: Manufacturer presents new software version with fixed
security issues
2017-04-10: Public release of security advisory



References:

[1] Product website for Password Safe and Repository Enterprise
http://www.passwordsafe.de/en/products/business/enterprise-edition.html
[2] SySS Security Advisory SYSS-2015-036

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2015-036.txt
[3] SySS Responsible Disclosure Policy
https://www.syss.de/en/news/responsible-disclosure-policy/



Credits:

This security vulnerability was found by Matthias Deeg of SySS GmbH.

E-Mail: matthias.deeg (at) syss.de
Public Key:
https://www.syss.de/fileadmin/dokumente/Materialien/PGPKeys/Matthias_Deeg.asc
Key fingerprint = D1F0 A035 F06C E675 CDB9 0514 D9A4 BF6A 34AD 4DAB



Disclaimer:

The information provided in this security advisory is provided "as is"
and without warranty of any kind. Details of this security advisory may
be updated in order to provide as accurate information as possible. The
latest version of this security advisory is available on the SySS Web
site.



Copyright:

Creative Commons - Attribution (by) - Version 3.0
URL: http://creativecommons.org/licenses/by/3.0/deed.en

-BEGIN PGP SIGNATURE-

iQIzBAEBCgAdFiEE0fCgNfBs5nXNuQUU2aS/ajStTasFAljrOqMACgkQ2aS/a

[FD] [SYSS-2017-027] Microsoft Windows Hello Face Authentication - Authentication Bypass by Spoofing (CWE-290)

2017-12-19 Thread Matthias Deeg
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Advisory ID: SYSS-2017-027
Product: Microsoft Windows Hello Face Authentication
Manufacturer: Microsoft
Affected Version(s): Windows 10 Pro (Version 1709, OS Build 16299.19)
 Windows 10 Pro (Version 1703, OS Build 15063.726)
 Windows 10 Pro (Version 1703, OS Build 15063.674)
 Windows 10 Pro (Version 1703, OS Build 15063.483)
 Windows 10 Pro (Version 1607, OS Build 14393.1914)
 Windows 10 Pro (Version 1607, OS Build 14393.1770)
 Windows 10 Pro (Version 1511, OS Build 10586.1232)
Tested Version(s): Windows 10 Pro (Version 1709, OS Build 16299.19)
   Windows 10 Pro (Version 1703, OS Build 15063.726)
   Windows 10 Pro (Version 1703, OS Build 15063.674)
   Windows 10 Pro (Version 1703, OS Build 15063.483)
   Windows 10 Pro (Version 1607, OS Build 14393.1914)
   Windows 10 Pro (Version 1607, OS Build 14393.1770)
   Windows 10 Pro (Version 1511, OS Build 10586.1232)
Vulnerability Type: Authentication Bypass by Spoofing (CWE-290)
Risk Level: High
Solution Status: Fixed on Windows 10 branches 1703 and 1709 with
 enabled "enhanced anti-spoofing" feature
Manufacturer Notification: 2017-10-20
Solution Date: 2017-12-18
Public Disclosure: 2017-12-18
CVE Reference: Not yet assigned
Authors of Advisory: Matthias Deeg and Philipp Buchegger (SySS GmbH)



Overview:

Microsoft Windows 10 offers a biometric authentication mechanism
using "near infrared" face recognition technology with specific Windows
Hello compatible cameras.

The manufacturer Microsoft describes the face authentication feature as
follows (see [1]):

"Microsoft face authentication in Windows 10 is an enterprise-grade
identity verification mechanism that's integrated into the Windows
Biometric Framework (WBF) as a core Microsoft Windows component called
Windows Hello. Windows Hello face authentication utilizes a camera
specially configured for near infrared (IR) imaging to authenticate and
unlock Windows devices as well as unlock your Microsoft Passport."

Further information about how Windows Hello works and its metrics
concerning false acceptance rate (FAR) and false rejection rate (FRR)
can also be found on the Microsoft website (see [2]).

Due to an insecure implementation of the biometric face recognition in
some Windows 10 versions, it is possible to bypass the Windows Hello
face authentication via a simple spoofing attack using a modified
printed photo of an authorized person.



Vulnerability Details:

SySS GmbH discovered that the Microsoft Windows Hello face
authentication using near infrared cameras in some Windows 10 versions
is vulnerable to simple spoofing attacks.

By using a modified printed photo of an authorized user, an unauthorized
attacker is able to log in to or unlock a locked Windows 10 system as
this spoofed authorized user.

Thus, by having access to a suitable photo of an authorized person
(frontal face photo), Windows Hello face authentication can easily be
bypassed with little effort, enabling unauthorized access to the Windows
system.

Both, the default Windows Hello configuration and Windows Hello with
the enabled "enhanced anti-spoofing" feature on different Windows 10
versions are vulnerable to the described spoofing attack and can be
bypassed. If "enhanced anti-spoofing" is enabled, depending on the
targeted Windows 10 version, a slightly different modified photo with
other attributes has to be used, but the additional effort for an
attacker is negligible. In general, the simple spoofing attack is less
reliable when the "enhanced anti-spoofing" feature is enabled.



Proof of Concept (PoC):

SySS GmbH could successfully bypass the configured Windows Hello user
authentication with face recognition on two Windows 10 systems using a
modified printed photo (paper printout) of an authorized user.

For example, the spoofing attack was performed against a laptop device
(Dell Latitude E7470) running Windows 10 Pro (Version 1703) with a
Windows Hello compatible webcam [3] and against a Microsoft Surface
Pro 4 device [4] running Windows 10 Pro (Version 1607) with the built-in
camera.

Only the used Microsoft Surface Pro 4 device supported the "enhanced
anti-spoofing" feature of Windows 10. The used LilBit USB IR camera only
supported the default configuration and could not be used with the more
secure face recognition settings.

The default Windows Hello configuration could successfully be bypassed
on both test devices with all tested Windows 10 versions. The more
secure 

[FD] [SYSS-2017-026] Microsoft Surface Hub Keyboard - Cryptographic Issues (CWE-310), Insufficient Protection against Replay Attacks

2018-01-30 Thread Matthias Deeg
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Advisory ID: SYSS-2017-026
Product: Microsoft Surface Hub Keyboard
Manufacturer: Microsoft
Affected Version(s): n/a
Tested Version(s): n/a
Vulnerability Type: Cryptographic Issues (CWE-310)
Insufficient Protection against Replay Attacks
Risk Level: Medium
Solution Status: Open
Manufacturer Notification: 2017-10-20
Solution Date: -
Public Disclosure: 2018-01-29
CVE Reference: Not yet assigned
Authors of Advisory: Matthias Deeg (SySS GmbH)



Overview:

The Microsoft Surface Hub Keyboard is a wireless keyboard that can be
used in combination with the digital whiteboard/collaboration system
Microsoft Surface Hub (see [1]).

Due to an insecure implementation of the encrypted data communication,
the Microsoft Surface Hub Keyboard is vulnerable to replay attacks with
certain restrictions.



Vulnerability Details:

The SySS GmbH found out that the Microsoft Surface Hub Keyboard Keyboard
is prone to replay attacks with some limitations.

An attacker can sniff the AES-encrypted data packets of the 2.4 GHz
radio communication sent by the keyboard to the receiver (USB dongle)
and replay the recorded communication data causing the same effect as
the original data communication.

According to test results of the SySS GmbH, the Microsoft Surface Hub
Keyboard and its USB dongle have implemented a replay protection based
on an incrementing packet counter. But the used window for valid packet
counter values is large enough to perform a replay attack if there were
not too many data packets caused by further keystrokes between the
attacker's recording and the playback. The same behavior was found in
the previously tested wireless keyboard Microsoft Wireless Desktop 2000
(see [2]).

A replay attack against the keyboard can, for example, be used to gain
unauthorized access to a computer system that is operated with a
vulnerable keyboard. In this attack scenario, an attacker records the
radio communication during a password-based user authentication of his
or her victim, for instance during a login to the operating system or
during unlocking a screen lock. At an opportune moment when the victim's
computer system is unattended, the attacker approaches the victim's
computer and replays the previously recorded AES-encrypted data
communication for the password-based user authentication and by this
gets unauthorized access to the victim's system.



Proof of Concept (PoC):

SySS GmbH could successfully perform a replay attack as described in the
previous section using the USB radio dongle Crazyradio PA (see [3]) and
the proof-of-concept software tool simple_replay.py that is part of the
SySS nRF24 Playset (see [4]).



Solution:

According to information from the manufacturer, the reported security
issue does not meet the requirements for a security patch.

For further information, please contact the manufacturer.



Disclosure Timeline:

2017-10-20: Vulnerability reported to manufacturer
2017-10-20: Manufacturer acknowledges e-mail with SySS security advisory
2017-11-30: E-mail from manufacturer with open questions
2017-12-01: E-mail to manufacturer concerning open questions
2017-12-08: E-mail from manufacturer with open questions regarding
attack scenarios and preconditions
2017-12-11: E-mail to manufacturer concerning open questions, attack
scenarios, and preconditions
2017-12-11: E-mail from manufacturer that the reported security issue
and its exploitability does not meet the bar for a security
patch
2017-12-13: E-mail to manufacturer explaining - from a SySS point of
view - the feasibility of actual replay attacks that exploit
the reported security vulnerability
2018-01-29: Public release of security advisory



References:

[1] Product website for Microsoft Surface Hub
https://www.microsoft.com/en-us/surface/devices/surface-hub/overview
[2] SySS Security Advisory SYSS-2016-043

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2016-043.txt
[3] Product website for Crazyradio PA
https://www.bitcraze.io/crazyradio-pa/
[4] SySS nRF24 Playset
https://github.com/SySS-Research/nrf24-playset
[5] SySS Security Advisory SYSS-2017-026

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2017-026.txt
[6] SySS Responsible Disclosure Policy
https://www.syss.de/en/responsible-disclosure-policy/



Credits:

This security vulnerability was found

[FD] [SYSS-2018-035]: ABUS Secvest Remote Control - Missing Encryption of Sensitive Data (CWE-311)

2019-03-26 Thread Matthias Deeg
Advisory ID: SYSS-2018-035
Product: ABUS Secvest Remote Control (FUBE50014, FUBE50015)
Manufacturer: ABUS
Affected Version(s): n/a
Tested Version(s): n/a
Vulnerability Type: Missing Encryption of Sensitive Data (CWE-311)
Risk Level: High
Solution Status: Open
Manufacturer Notification: 2018-11-21
Solution Date: -
Public Disclosure: 2019-03-25
CVE Reference: CVE-2019-9862
Authors of Advisory: Matthias Deeg (SySS GmbH), Thomas Detert



Overview:

ABUS Secvest FUBE50014 and FUBE50015 are wireless remote controls for
the ABUS Secvest wireless alarm system.

Some of the device features as described by the manufacturer are
(see [1]):

"
* User-friendly remote control with easily identifiable symbols
* Features ‘arm’, ‘disarm’ and ‘status query’ keys
* 8 LEDs provide an overview and display current system status
* Button for custom configuration available (Secvest wireless alarm
  system only)
* Optional manual panic alarm available (Secvest wireless alarm system
  only)
* Encrypted signal transmission
* Rolling Code
  Thanks to the rolling code process this product is protected against
  so-called replay attacks. All controlling signals between this product
  and the Secvest alarm panel are in individualised and thus, are not
  able to be reproduced by third parties. This process is protected
  from third party tampering, and exceeds the requirements of the
  DIN EN 50131-1 level 2 security standard.
"

Due to the missing "Encrypted signal transmission", an attacker is able
to eavesdrop sensitive data as cleartext, for instance the current
rolling code state.



Vulnerability Details:

Thomas Detert found out that the claimed "Encrypted signal transmission"
of the Secvest wireless remote control FUBE50014 is not present at all.

Thus, an attacker observing radio signals of an ABUS FUBE50014
wireless remote control is able to see all sensitive data of
transmitted packets as cleartext and can analyze the used packet format
and the communication protocol.

For instance, this security issue could successfully be exploited to
observe the current rolling code state of the wireless remote control
and deduce the cryptographically weak used rolling code algorithm
(see SySS security advisory SYSS-2018-034 [2]).

SySS found out that the new ABUS Secvest remote control FUBE50015 is
also affected by this security vulnerability.



Proof of Concept (PoC):

Thomas Detert developed a Teensy-based PoC tool using a CC1101 sub-1GHz
transceiver that allows disarming the alarm system in an unauthorized
way. He provided his tool including documentation and source to SySS
GmbH for responsible disclosure purposes.

SySS GmbH could successfully perform a disarming attack against an ABUS
Secvest wireless alarm system by exploiting the unencrypted signal
transmission of the ABUS Secvest wireless remote controls FUBE50014 and
FUBE50015 and the predictable rolling code implementation using either
Mr. Detert's PoC tool, a developed Python tool for the RFCat-based radio
dongle YARD Stick One (see [3]), or a eZ430-Chronos (see [4]) with a
specially developed firmware.

Successful disarming attacks against an ABUS Secvest wireless alarm
system are shown in our SySS proof-of-concept video "ABUS Secvest
Rolling Code PoC Attack" [7].



Solution:

SySS GmbH is not aware of a solution for this reported security
vulnerability.



Disclosure Timeline:

2018-11-21: Vulnerability reported to manufacturer
2018-11-28: Vulnerability reported to manufacturer once more
2018-12-12: E-mail to ABUS support asking if they are going to give
some feedback regarding the reported security issue
2018-12-12: Phone call with ABUS support, the reported security
advisories were forwarded to the ABUS Security Center
Support
2018-12-12: E-mail to ABUS Security Center Support asking if they are
going to give some feedback regarding the reported security
issue
2019-01-14: Updated information regarding remote control ABUS Secvest
FUBE50015
2019-03-25: Public release of security advisory



References:

[1] Product website for ABUS Secvest wireless remote control

https://www.abus.com/eng/Home-Security/Alarm-systems/Secvest-wireless-alarm-system/Control-devices-and-extensions/Secvest-Wireless-Remote-Control2
[2] SySS Security Advisory SYSS-2018-034

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-034.txt
[3] Product website YARD Stick One
https://greatscottgadgets.com/yardstickone/
[4] Product website for 

[FD] [SYSS-2018-034]: ABUS Secvest - Rolling Code - Predictable from Observable State (CWE-341)

2019-03-26 Thread Matthias Deeg
Advisory ID: SYSS-2018-034
Product: ABUS Secvest (FUAA5)
Manufacturer: ABUS
Affected Version(s): v3.01.01
Tested Version(s): v3.01.01
Vulnerability Type: Rolling Code - Predictable from Observable State
(CWE-341)
Risk Level: High
Solution Status: Open
Manufacturer Notification: 2018-11-21
Solution Date: -
Public Disclosure: 2019-03-25
CVE Reference: CVE-2019-9863
Authors of Advisory: Matthias Deeg (SySS GmbH), Thomas Detert



Overview:

ABUS Secvest (FUAA5) is a wireless alarm system with different
features.

Some of the supported features as described by the manufacturer are
(see [1]):

"
* Convenient operation via the app (Android/iOS), integrated web
  browser and also at the alarm panel
* For up to 50 users with freely selectable control options
  (code/chip key/remote control)
* Active intrusion protection in combination with additional mechatronic
  wireless window/door locks
* Video verification of alarms via email, push notifications or via the
  app
* Up to 48 individually identifiable wireless detectors, eight control
  panels, 50 remote controls
* Integrated dialling device
* VdS Home certified and EN 50131-1 Level 2
* Alarm verification via the integration of up to six IP cameras
* 32 additional wireless outputs for flexible event control
* Switching to monitoring station via protocols possible
"

Due to the use of an insecure algorithm for rolling codes, an attacker
is able to predict valid future rolling codes and can thus remotely
control the ABUS Secvest wireless alarm system in an unauthorized way.



Vulnerability Details:

Thomas Detert found out that the rolling codes implemented as replay
protection (see SySS security advisory SYSS-2016-117 [2]) in the radio
communication protocol used by the ABUS Secvest wireless alarm system
(FUAA5) and its remote control (FUBE50014, FUB50015) is
cryptographically weak. Thus, an attacker observing the unencrypted radio
signals of an ABUS FUBE50014 or FUBE50015 wireless remote control
(see SySS security advisory SYSS-2018-035 [6]) is able to deduce the
implemented rolling code algorithm and to correctly predict valid future
rolling codes.

This enables an attacker to remotely control affected wireless alarm
systems in an unauthorized manner, for instance disarming the wireless
alarm system at will.



Proof of Concept (PoC):

Thomas Detert developed a Teensy-based PoC tool using a CC1101 sub-1GHz
transceiver that allows disarming the alarm system in an unauthorized
way. He provided his tool including documentation and source to SySS
GmbH for responsible disclosure purposes.

SySS GmbH could successfully perform a disarming attack against an ABUS
Secvest wireless alarm system by exploiting the unencrypted signal
transmission of the ABUS Secvest wireless remote controls FUBE50014 and
FUBE50015 and the predictable rolling code implementation using either
Mr. Detert's PoC tool, a developed Python tool for the RFCat-based radio
dongle YARD Stick One (see [3]), or a eZ430-Chronos (see [4]) with a
specially developed firmware.

Successful disarming attacks against an ABUS Secvest wireless alarm
system are shown in our SySS proof-of-concept video "ABUS Secvest
Rolling Code PoC Attack" [8].



Solution:

SySS GmbH is not aware of a solution for this reported security
vulnerability.



Disclosure Timeline:

2018-11-21: Vulnerability reported to manufacturer
2018-11-28: Vulnerability reported to manufacturer once more
2018-12-12: E-mail to ABUS support asking if they are going to give
some feedback regarding the reported security issue
2018-12-12: Phone call with ABUS support, the reported security
advisories were forwarded to the ABUS Security Center
Support
2018-12-12: E-mail to ABUS Security Center Support asking if they are
going to give some feedback regarding the reported security
issue
2019-01-14: Updated information regarding remote control ABUS Secvest
FUBE50015
2019-03-25: Public release of security advisory



References:

[1] Product website for ABUS Secvest wireless alarm system

https://www.abus.com/eng/Home-Security/Alarm-systems/Secvest-wireless-alarm-system/Alarm-panels-and-kits/Secvest-Wireless-Alarm-System
[2] SySS Security Advisory SYSS-2016-117

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2016-117.txt
[3] Product website YARD Stick One
https://greatscottgadgets.com/yardstickone/
[4] Product website for Texas Instruments eZ430-Chronos
http://www.ti.com/tool/EZ430-CHRONOS
[5] Sy

[FD] [SYSS-2018-036]: ABUS Secvest Remote Control - Denial of Service - Uncontrolled Resource Consumption (CWE-400)

2019-03-26 Thread Matthias Deeg
Advisory ID: SYSS-2018-036
Product: ABUS Secvest Remote Control (FUBE50014, FUBE50015)
Manufacturer: ABUS
Affected Version(s): n/a
Tested Version(s): n/a
Vulnerability Type: Denial of Service - Uncontrolled Resource
Consumption (CWE-400)
Risk Level: Low
Solution Status: Open
Manufacturer Notification: 2018-11-21
Solution Date: -
Public Disclosure: 2019-03-25
CVE Reference: CVE-2019-9860
Authors of Advisory: Matthias Deeg (SySS GmbH), Thomas Detert



Overview:

ABUS Secvest FUBE50014 and FUBE50015 are wireless remote controls for
the ABUS Secvest wireless alarm system.

Some of the device features as described by the manufacturer are
(see [1]):

"
* User-friendly remote control with easily identifiable symbols
* Features ‘arm’, ‘disarm’ and ‘status query’ keys
* 8 LEDs provide an overview and display current system status
* Button for custom configuration available (Secvest wireless alarm
  system only)
* Optional manual panic alarm available (Secvest wireless alarm system
  only)
* Encrypted signal transmission
* Rolling Code
  Thanks to the rolling code process this product is protected against
  so-called replay attacks. All controlling signals between this product
  and the Secvest alarm panel are in individualised and thus, are not
  able to be reproduced by third parties. This process is protected
  from third party tampering, and exceeds the requirements of the
  DIN EN 50131-1 level 2 security standard.
"

Due to unencrypted signal communication and predictability of rolling
codes, an attacker can "desynchronize" an ABUS Secvest wireless remote
control regarding its controlled Secvest wireless alarm system, so that
sent commands by the remote control are not accepted anymore.



Vulnerability Details:

Thomas Detert found out that the claimed "Encrypted signal transmission"
of the Secvest wireless remote control FUBE50014 is not present (see
SySS security advisory SYSS-2018-035 [2]) and that the implemented
rolling codes are predictable (see SySS security advisory SYSS-2018-034
[3]).

By exploiting these two security issues, an attacker can simply
desynchronize a wireless remote control by observing the current rolling
code state, generating many valid rolling codes, and use them before the
original wireless remote control.

The Secvest wireless alarm system will ignore sent commands by the
wireless remote control until the generated rolling code happens to
match the window of valid rolling code values again. Depending on the
number of used rolling codes by the attacker, a resynchronization
without actually reconfiguring the wireless remote control could take
quite a lot of time and effectless button presses.

SySS found out that the new ABUS Secvest remote control FUBE50015 is
also affected by this security vulnerability.



Proof of Concept (PoC):

Thomas Detert developed a Teensy-based PoC tool using a CC1101 sub-1GHz
transceiver that allows disarming the alarm system in an unauthorized
way. He provided his tool including documentation and source to SySS
GmbH for responsible disclosure purposes.

Based on Mr. Detert's PoC tool, SySS GmbH developed a Python tool for
the RFCat-based radio dongle YARD Stick One (see [4]) for demonstrating
this simple denial-of-service (DoS) attack against the ABUS Secvest
wireless remote controls FUBE50014 and FUBE50015. This tool simply
generates many valid rolling codes based on the current observed state
and uses them resulting in desynchronizing the original wireless remote
control.



Solution:

SySS GmbH is not aware of a solution for this reported security
vulnerability.



Disclosure Timeline:

2018-11-21: Vulnerability reported to manufacturer
2018-11-28: Vulnerability reported to manufacturer once more
2018-12-12: E-mail to ABUS support asking if they are going to give
some feedback regarding the reported security issue
2018-12-12: Phone call with ABUS support, the reported security
advisories were forwarded to the ABUS Security Center
Support
2018-12-12: E-mail to ABUS Security Center Support asking if they are
going to give some feedback regarding the reported security
issue
2019-01-14: Updated information regarding remote control ABUS Secvest
FUBE50015
2019-03-25: Public release of security advisory



References:

[1] Product website for ABUS Secvest wireless remote control

https://www.abus.com/eng/Home-Security/Alarm-systems/Secvest-wireless-alarm-system/Control-devices-and-extensions/Secvest-Wireless-Remote-Control2
[2] Sy

[FD] [SYSS-2019-014]: Siemens LOGO! 8 - Storing Passwords in a Recoverable Format (CWE-257)

2019-05-29 Thread Matthias Deeg
Advisory ID: SYSS-2019-014
Product: LOGO!
Manufacturer: Siemens
Affected Version(s): LOGO! 8 (all versions)
Tested Version(s): LOGO! 8, 6ED1052-2MD00-0BA8 FS:03, 0BA8.Standard V1.08.03
Vulnerability Type: Storing Passwords in a Recoverable Format (CWE-257)
Risk Level: Medium
Solution Status: Open
Manufacturer Notification: 2019-04-04
Solution Date: 2019-05-14 (recommended mitigation by manufacturer)
Public Disclosure: 2019-05-29
CVE Reference: CVE-2019-10921
Authors of Advisory: Manuel Stotz (SySS GmbH), Matthias Deeg (SySS GmbH)



Overview:

Siemens LOGO! is a programmable logic controller (PLC) for small
automation tasks.

The manufacturer describes the product as follows (see [1]):

"Simple installation, minimum wiring, user-friendly programming: You can
easily implement small automation projects with LOGO!, the intelligent
logic module from Siemens. The LOGO! Logic Module saves space in the
control cabinet, and lets you easily implement functions, such as
time-delay switches, time relays, counters and auxiliary relays. "

Due to storing passwords in a recoverable format on LOGO! 8 PLCs, an
attacker can gain access to configured passwords as cleartext.



Vulnerability Details:

SySS GmbH found out that passwords are stored in a recoverable format on
LOGO! 8 PLCs.

Thus, if an attacker finds a way to retrieve this password data, for
instance exploiting the security vulnerabilities described in the SySS
security advisories SYSS-2019-012 [2] and SYSS-2019-013 [3], direct
access to cleartext passwords is given.



Proof of Concept (PoC):

SySS GmbH could successfully extract sensitive data such as configured
passwords as cleartext from a LOGO! 8 using a developed Nmap script.

The following Nmap output exemplarily shows extracting cleartext
password data from a LOGO! 8 PLC:

$ nmap -p 10005 --script slig.nse 192.168.10.112
Starting Nmap 7.70 ( https://nmap.org ) at 2019-04-16 17:21 CEST
Nmap scan report for 192.168.10.112
Host is up (0.00044s latency).

PORT  STATE SERVICE
10005/tcp open  stel
| slig: Gathered Siemens LOGO!8 access details and passwords
| User: LSCUser
| Password: S3cret1
| Enabled: True
| User: AppUser
| Password: S3cret2
| Enabled: True
| User: WebUser
| Password: S3cret3
| Enabled: True
| User: TDUser
| Password: S3cret4
| Enabled: True
| Protection: Password
| Program password: SECRET
|_MMC serial: \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00

Nmap done: 1 IP address (1 host up) scanned in 0.43 seconds

A successful attack against a LOGO! 8 extracting all configured
passwords is demonstrated in our SySS PoC video [7].



Solution:

In the publicly released Siemens Security Advisory SSA-542701 [3],
the manufacturer Siemens recommends to apply a defense-in-depth concept,
including protection concept outlined in the system manual, as a
mitigation for reducing the risk of the described security issue.



Disclosure Timeline:

2019-04-04: Vulnerability reported to manufacturer
2019-04-04: Manufacturer confirms receipt of security advisory and
asks for referenced Nmap script
2019-04-04: SySS provides PoC Nmap script
2019-05-14: Public release of Siemens Security Advisory SSA-542701
2019-05-29: Public release of SySS security advisory



References:

[1] Product website for Siemens LOGO!

https://new.siemens.com/global/en/products/automation/systems/industrial/plc/logo.html
[2] SySS Security Advisory SYSS-2019-012

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-012.txt
[3] SySS Security Advisory SYSS-2019-013

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-013.txt
[4] SySS Security Advisory SYSS-2019-014

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-014.txt
[5] Siemens Security Advisory SSA-542701
https://cert-portal.siemens.com/productcert/pdf/ssa-542701.pdf
[6] SySS Responsible Disclosure Policy
https://www.syss.de/en/responsible-disclosure-policy/
[7] SySS Proof-of-Concept Video "Siemens LOGO! 8 PLC Password Hacking"
https://youtu.be/TpH4EABGYCs



Credits:

This security vulnerability was found by Manuel Stotz of SySS GmbH.

E-Mail: manuel.stotz (at) syss.de
Public Key: https://www.syss.de/fileadmin/dokumente/PGPKeys/Manuel_Stotz.asc
Key fingerprint = F051 5B74 7E70 193E 7F66 0133 E790 F68A BCE6 8C6D



Disclaimer:

The information provided in this security 

[FD] [SYSS-2019-012]: Siemens LOGO! 8 - Use of Hard-coded Cryptographic Key (CWE-321)

2019-05-29 Thread Matthias Deeg
Advisory ID: SYSS-2019-012
Product: LOGO!
Manufacturer: Siemens
Affected Version(s): LOGO! 8 (all versions)
Tested Version(s): LOGO! 8, 6ED1052-2MD00-0BA8 FS:03, 0BA8.Standard V1.08.03
Vulnerability Type: Use of Hard-coded Cryptographic Key (CWE-321)
Risk Level: High
Solution Status: Open
Manufacturer Notification: 2019-04-04
Solution Date: 2019-05-14 (recommended mitigation by manufacturer)
Public Disclosure: 2019-05-29
CVE Reference: CVE-2019-10920
Authors of Advisory: Manuel Stotz, Matthias Deeg (SySS GmbH)



Overview:

Siemens LOGO! is a programmable logic controller (PLC) for small
automation tasks.

The manufacturer describes the product as follows (see [1]):

"Simple installation, minimum wiring, user-friendly programming: You can
easily implement small automation projects with LOGO!, the intelligent
logic module from Siemens. The LOGO! Logic Module saves space in the
control cabinet, and lets you easily implement functions, such as
time-delay switches, time relays, counters and auxiliary relays. "

Due to the use of a hard-coded cryptographic key, an attacker can put
the integrity and confidentiality of encrypted data of all LOGO! 8 PLCs
using this key at risk, for instance decrypting network communication
during a man-in-the-middle attack.



Vulnerability Details:

SySS GmbH found out that LOGO! PLCs use a static, hard-coded
cryptographic 3DES key for protecting sensitive information, like
network communication and configuration data.

For instance, this key can be found within the LOGO! Soft Comfort
software.

By knowing this static cryptographic 3DES key, an attacker can decrypt
all LOGO! data that is encrypted with this key and gain access to
sensitive data, for instance different configured passwords.



Proof of Concept (PoC):

SySS GmbH used the hard-coded cryptographic 3DES key in a software tool
(Nmap script) for extracting sensitive data such as configured passwords
as cleartext.

The following Nmap output exemplarily shows extracting password data
from a LOGO! 8 PLC:

$ nmap -p 10005 --script slig.nse 192.168.10.112
Starting Nmap 7.70 ( https://nmap.org ) at 2019-04-04 09:35 CEST
Nmap scan report for 192.168.10.112
Host is up (0.00044s latency).

PORT  STATE SERVICE
10005/tcp open  stel
| slig: Gathered Siemens LOGO!8 access details and passwords
| User: LSCUser
| Password: S3cret1
| Enabled: True
| User: AppUser
| Password: S3cret2
| Enabled: True
| User: WebUser
| Password: S3cret3
| Enabled: True
| User: TDUser
| Password: S3cret4
| Enabled: True
| Protection: Password
| Program password: SECRET
|_MMC serial: \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00

Nmap done: 1 IP address (1 host up) scanned in 0.43 seconds

A successful attack against a LOGO! 8 extracting all configured
passwords is demonstrated in our SySS PoC video [5].



Solution:

In the publicly released Siemens Security Advisory SSA-542701 [3],
the manufacturer Siemens recommends to apply a defense-in-depth concept,
including protection concept outlined in the system manual, as a
mitigation for reducing the risk of the described security issue.



Disclosure Timeline:

2019-04-04: Vulnerability reported to manufacturer
2019-04-04: Manufacturer confirms receipt of security advisory and
asks for referenced Nmap script
2019-04-04: SySS provides PoC Nmap script
2019-05-14: Public release of Siemens Security Advisory SSA-542701
2019-05-29: Public release of SySS security advisory



References:

[1] Product website for Siemens LOGO!

https://new.siemens.com/global/en/products/automation/systems/industrial/plc/logo.html
[2] SySS Security Advisory SYSS-2019-012

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-012.txt
[3] Siemens Security Advisory SSA-542701
https://cert-portal.siemens.com/productcert/pdf/ssa-542701.pdf
[4] SySS Responsible Disclosure Policy
https://www.syss.de/en/responsible-disclosure-policy/
[5] SySS Proof-of-Concept Video "Siemens LOGO! 8 PLC Password Hacking"
https://youtu.be/TpH4EABGYCs



Credits:

This security vulnerability was found by Manuel Stotz of SySS GmbH.

E-Mail: manuel.stotz (at) syss.de
Public Key: https://www.syss.de/fileadmin/dokumente/PGPKeys/Manuel_Stotz.asc
Key fingerprint = F051 5B74 7E70 193E 7F66 0133 E790 F68A BCE6 8C6D



Disclaimer:

The information provided in this security advisory is provided "as is"
and without

[FD] [SYSS-2019-007]: Inateck 2.4 GHz Wireless Presenter WP1001 - Keystroke Injection Vulnerability

2019-06-11 Thread Matthias Deeg
Advisory ID: SYSS-2019-007
Product: 2.4 GHz Wireless Presenter WP1001
Manufacturer: Inateck
Affected Version(s): Rev. v1.3C
Tested Version(s): Rev. v1.3C
Vulnerability Type: Insufficient Verification of Data Authenticity (CWE-345)
Keystroke Injection Vulnerability
Risk Level: High
Solution Status: Open
Manufacturer Notification: 2019-03-22
Solution Date: -
Public Disclosure: 2019-06-04
CVE Reference: CVE-2019-12505
Author of Advisory: Matthias Deeg (SySS GmbH)



Overview:

Inateck WP1001 is a wireless presenter using 2.4 GHz radio
communication.

The manufacturer describes the product as follows:

"* 2.4GHz Wireless Connection allows you to move around while
   giving presentations
 * Fingertip Controls make it easy for you to adjust the volume, change
   slides and more
 * Red Laser Pointer words up to 65 feet(20m) away
 * LCD Screen with timer vibration and low-battery indicator
 * Includes Carrying Case to help protect your device on the go
"

Due to unencrypted and unauthenticated data communication, the wireless
presenter Inateck WP1001 is prone to keystroke injection attacks.



Vulnerability Details:

SySS GmbH found out that the wireless presenter Inateck WP1001 is
vulnerable to keystroke injection attacks.

An attacker can analyze the unencrypted and unauthenticated data
packets of the 2.4 GHz radio communication sent by the wireless
presenter to the receiver (USB dongle) in order to learn the used
protocol. By knowing the used data protocol, it is possible to inject
packets in the data communication that are actually interpreted as
keystrokes by the receiver on the target system.

Thus, an attacker is able to send arbitrary keystrokes to a victim's
computer system, for example in order to install malware when the target
system is unattended. In this way, an attacker can remotely take control
over the victim's computer that is operated with an affected receiver of
an Inateck WP1001 wireless presenter.



Proof of Concept (PoC):

SySS GmbH could successfully perform keystroke injection attacks against
the wireless presenter Inateck WP1001 using the open-source software
tool Universal Radio Hacker [2] in combination with the software-defined
radio HackRF One [3].



Solution:

SySS GmbH is not aware of a solution for this reported security
vulnerability.



Disclosure Timeline:

2019-03-22: Vulnerability reported to manufacturer
2019-06-04: Public release of security advisory



References:

[1] Manufacturer website
https://www.inateck.com/
[2] Universal Radio Hacker (URH)
https://github.com/jopohl/urh
[3] HackRF One by Great Scott Gadgets
https://greatscottgadgets.com/hackrf/
[4] SySS Security Advisory SYSS-2019-007

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-007.txt
[5] SySS Responsible Disclosure Policy
https://www.syss.de/en/responsible-disclosure-policy/



Credits:

This security vulnerability was found by Matthias Deeg of SySS GmbH.

E-Mail: matthias.deeg (at) syss.de
Public Key:
https://www.syss.de/fileadmin/dokumente/Materialien/PGPKeys/Matthias_Deeg.asc
Key fingerprint = D1F0 A035 F06C E675 CDB9 0514 D9A4 BF6A 34AD 4DAB



Disclaimer:

The information provided in this security advisory is provided "as is"
and without warranty of any kind. Details of this security advisory may
be updated in order to provide as accurate information as possible. The
latest version of this security advisory is available on the SySS Web
site.



Copyright:

Creative Commons - Attribution (by) - Version 3.0
URL: http://creativecommons.org/licenses/by/3.0/deed.en



signature.asc
Description: OpenPGP digital signature

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

[FD] [SYSS-2019-015]: Logitech R700 Laser Presentation Remote - Keystroke Injection Vulnerability

2019-06-11 Thread Matthias Deeg
Advisory ID: SYSS-2019-015
Product: R700 Laser Presentation Remote
Manufacturer: Logitech
Affected Version(s): Model R-R0010 (PID WD904XM and PID WD802XM)
Tested Version(s): Model R-R0010 (PID WD904XM and PID WD802XM)
Vulnerability Type: Insufficient Verification of Data Authenticity (CWE-345)
Keystroke Injection Vulnerability
Risk Level: High
Solution Status: Open
Manufacturer Notification: 2019-04-12
Solution Date: -
Public Disclosure: 2019-06-04
CVE Reference: CVE-2019-12506
Author of Advisory: Matthias Deeg (SySS GmbH)



Overview:

Logitech R700 Laser Presentation Remote is a wireless presenter using
2.4 GHz radio communication.

The manufacturer describes the product as follows [1]:

"Brilliant red laser pointer helps you get their attention - and keep
it."

Due to unencrypted and unauthenticated data communication, the wireless
presenter Logitech R700 Laser Presentation Remote is prone to keystroke
injection attacks.



Vulnerability Details:

SySS GmbH found out that the wireless presenter Logitech R700 Laser
Presentation Remote is vulnerable to keystroke injection attacks.

An attacker can analyze the unencrypted and unauthenticated data packets
of the 2.4 GHz radio communication sent by the wireless presenter to the
receiver (USB dongle) in order to learn the used protocol. By knowing
the used data protocol, it is possible to inject packets in the data
communication that are actually interpreted as keystrokes by the
receiver on the target system.

Thus, an attacker is able to send arbitrary keystrokes to a victim's
computer system, for example in order to install malware when the target
system is unattended. In this way, an attacker can remotely take control
over the victim's computer that is operated with an affected receiver of
a Logitech R700 wireless presenter.



Proof of Concept (PoC):

SySS GmbH could successfully perform keystroke injection attacks against
the wireless presenter Logitech R700 Laser Presentation Remote using an
in-house developed software tool in combination with the USB radio
dongle Crazyradio PA and the nrf-research-firmware by Bastille Networks
Internet Security [2, 3].

The following output of the developed proof-of-concept software tool
illustrates a successful attack:

# python2 logitech_presenter.py -a 7F:20:9E:C2:07
_  __ ___  _  _ _  _  _
   |  __ \|  |__ \| || |   |  __ \| || |
  _ __ | |__) | |__ ) | || |_  | |__) | | __ _ _   _ ___  ___| |_
 | '_ \|  _  /|  __|   / /|__   _| |  ___/| |/ _` | | | / __|/ _ \ __|
 | | | | | \ \| | / /_   | |   | || | (_| | |_| \__ \  __/ |_
 |_| |_|_|  \_\_|||  |_|   |_||_|\__,_|\__, |___/\___|\__|
__/ |
   |___/
Logitech Wireless Presenter Attack Tool v1.0 by Matthias Deeg - SySS
GmbH (c) 2016
[*] Configure nRF24 radio
[*] Actively searching for address 07:C2:9E:20:7F
[*] Ping success on channel 8
[*] Ping success on channel 8
[*] Press  to start keystroke injection
^C
[*] Start keystroke injection ...
[*] Done.

This demonstrated keystroke injection attack also worked in 2016 against
the wireless presenter Logitech R400, which is described in the SySS
security advisory SYSS-2016-074 [4].



Solution:

SySS GmbH is not aware of a solution for this reported security
vulnerability.



Disclosure Timeline:

2019-04-12: Vulnerability reported to manufacturer
2019-06-04: Public release of security advisory



References:

[1] Product website for Logitech R700
https://www.logitech.com/en-roeu/product/professional-presenter-r700
[2] Product website for Crazyradio PA
https://www.bitcraze.io/crazyradio-pa/
[3] Bastille's nRF24 research firmware and tools
https://github.com/BastilleResearch/nrf-research-firmware
[4] SySS Security Advisory SYSS-2016-074

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2016-074.txt
[5] SySS Security Advisory SYSS-2019-015

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-015.txt
[6] SySS Responsible Disclosure Policy
https://www.syss.de/en/responsible-disclosure-policy/



Credits:

This security vulnerability was found by Matthias Deeg of SySS GmbH.

E-Mail: matthias.deeg (at) syss.de
Public Key:
https://www.syss.de/fileadmin/dokumente/Materialien/PGPKeys/Matthias_Deeg.asc
Key fingerprint = D1F0 A035 F06C E675 CDB9 0514 D9A4

[FD] [SYSS-2019-008]: Inateck 2.4 GHz Wearable Wireless Presenter WP2002 - Keystroke Injection Vulnerability

2019-06-11 Thread Matthias Deeg
Advisory ID: SYSS-2019-008
Product: 2.4 GHz Wearable Wireless Presenter WP2002
Manufacturer: Inateck
Affected Version(s): n/a
Tested Version(s): n/a
Vulnerability Type: Insufficient Verification of Data Authenticity (CWE-345)
Keystroke Injection Vulnerability
Risk Level: High
Solution Status: Open
Manufacturer Notification: 2019-03-22
Solution Date: -
Public Disclosure: 2019-06-04
CVE Reference: CVE-2019-12504
Author of Advisory: Matthias Deeg (SySS GmbH)



Overview:

Inateck WP2002 is a ring-shaped wearable wireless presenter using
2.4 GHz radio communication.

The manufacturer describes the product as follows:

"
* Easy to Use: Uses 2.4 GHz USB wireless connection, with receiving
  distance reaching 20 meters. You’re free to move in a large space
  when wearing it on fingers. No driver needed, just plug and play!
* Ring-shaped design. You can wear it on your fingers (the ring is
  adjustable). Free your hands and have more body language, which will
  let your speech become more attractive.
* Multi-functional: By controlling the three function keys in control
  key area, you can turn pages, open full screen, close the screen, and
  access a hyperlink.
* Prolonged working use. Full charge allows a continuous working time
  of 15 days. Battery life is powerful, which greatly facilitates
  frequent use.
* Fits Powerpoint, Keynote(except hyperlink and windows switch
  functions), and supports page turning function with Google Slides and
  Prezi. Compatible with Windows XP/7/8/8.1/10, Mac OS, Linux, Android
  and etc.
"

Due to unencrypted and unauthenticated data communication, the wireless
presenter Inateck WP2002 is prone to keystroke injection attacks.



Vulnerability Details:

SySS GmbH found out that the wireless presenter Inateck WP2002 is
vulnerable to keystroke injection attacks.

An attacker can analyze the unencrypted and unauthenticated data
packets of the 2.4 GHz radio communication sent by the wireless
presenter to the receiver (USB dongle) in order to learn the used
protocol. By knowing the used data protocol, it is possible to inject
packets in the data communication that are actually interpreted as
keystrokes by the receiver on the target system.

Thus, an attacker is able to send arbitrary keystrokes to a victim's
computer system, for example in order to install malware when the target
system is unattended. In this way, an attacker can remotely take control
over the victim's computer that is operated with an affected receiver of
an Inateck WP2002 wireless presenter.



Proof of Concept (PoC):

SySS GmbH could successfully perform keystroke injection attacks against
the wireless presenter Inateck WP2002 using the open-source software
tool Universal Radio Hacker [2] in combination with the software-defined
radio HackRF One [3].



Solution:

SySS GmbH is not aware of a solution for this reported security
vulnerability.



Disclosure Timeline:

2019-03-22: Vulnerability reported to manufacturer
2019-06-04: Public release of security advisory



References:

[1] Product website for Inateck WP2002

https://www.inateck.com/de/kabellos-praesentationsgeraet-laiserpointer-presenter-fernbedienung-powerpoint-keynote-usb-adapter-plug-and-play-schwarz-wp2002.html
[2] Universal Radio Hacker (URH)
https://github.com/jopohl/urh
[3] HackRF One by Great Scott Gadgets
https://greatscottgadgets.com/hackrf/
[4] SySS Security Advisory SYSS-2019-008

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-008.txt
[5] SySS Responsible Disclosure Policy
https://www.syss.de/en/responsible-disclosure-policy/



Credits:

This security vulnerability was found by Matthias Deeg of SySS GmbH.

E-Mail: matthias.deeg (at) syss.de
Public Key:
https://www.syss.de/fileadmin/dokumente/Materialien/PGPKeys/Matthias_Deeg.asc
Key fingerprint = D1F0 A035 F06C E675 CDB9 0514 D9A4 BF6A 34AD 4DAB



Disclaimer:

The information provided in this security advisory is provided "as is"
and without warranty of any kind. Details of this security advisory may
be updated in order to provide as accurate information as possible. The
latest version of this security advisory is available on the SySS Web
site.



Copyright:

Creative Commons - Attribution (by) - Version 3.0
URL: http://creativecommons.org/licenses/by/3.0/deed.en




signa

[FD] [SYSS-2019-005]: ABUS Secvest - Proximity Key - Cryptographic Issues (CWE-310)

2019-05-04 Thread Matthias Deeg
Advisory ID: SYSS-2019-005
Product: ABUS Secvest (FUAA5)
Manufacturer: ABUS
Affected Version(s): v3.01.01
Tested Version(s): v3.01.01
Vulnerability Type: Cryptographic Issues (CWE-310)
Risk Level: Medium
Solution Status: Open
Manufacturer Notification: 2019-03-15
Solution Date: -
Public Disclosure: 2019-05-02
CVE Reference: CVE-2019-9861
Authors of Advisory: Matthias Deeg, Gerhard Klostermeier (SySS GmbH)



Overview:

ABUS Secvest (FUAA5) is a wireless alarm system with different
features.

Some of the supported features as described by the manufacturer are
(see [1]):

"
* Convenient operation via the app (Android/iOS), integrated web
  browser and also at the alarm panel
* For up to 50 users with freely selectable control options
  (code/chip key/remote control)
* Active intrusion protection in combination with additional mechatronic
  wireless window/door locks
* Video verification of alarms via email, push notifications or via the
  app
* Up to 48 individually identifiable wireless detectors, eight control
  panels, 50 remote controls
* Integrated dialling device
* VdS Home certified and EN 50131-1 Level 2
* Alarm verification via the integration of up to six IP cameras
* 32 additional wireless outputs for flexible event control
* Switching to monitoring station via protocols possible
"

Due to the use of an insecure RFID technology (MIFARE Classic), ABUS
proximity chip keys (RFID tokens) [2] of the ABUS Secvest wireless alarm
system can easily be cloned and used to deactivate the alarm system in
an unauthorized way.



Vulnerability Details:

SySS GmbH found out that the RFID technology used by the ABUS Secvest
wireless alarm system and its ABUS proximity keys (MIFARE Classic RFID
tags) is vulnerable to RFID cloning attacks.

The information stored on the used proximity keys can be read easily in
a very short time from distances up to 1 meter, depending on the used
RFID reader. A working cloned RFID token is ready for use within a
couple of seconds using freely available tools.

Thus, an attacker with one-time access to the information of an ABUS
proximity key for an ABUS Secvest wireless alarm system is able to
create a rogue RFID token that can be used to deactivate the alarm
system in an unauthorized manner.



Proof of Concept (PoC):

SySS GmbH could successfully clone ABUS proximity keys of an ABUS
Secvest wireless alarm system using different freely available
off-the-shelf tools like an Android smartphone with the Mifare Classic
Tool (MCT) [3], a ChameleonMini [4], and an RFID/NFC reader/writer [5]
and disarm the wireless alarm system in an unauthorized way.

All three RFID cloning attacks are demonstrated in our SySS
proof-of-concept video "ABUS Secvest Proximity Key Cloning PoC Attack"
[6].



Solution:

SySS GmbH is not aware of a solution for this reported security
vulnerability.



Disclosure Timeline:

2019-03-15: Vulnerability reported to manufacturer
2016-05-02: Public release of security advisory



References:

[1] Product website for ABUS Secvest wireless alarm system

https://www.abus.com/eng/Home-Security/Alarm-systems/Secvest-wireless-alarm-system/Alarm-panels-and-kits/Secvest-Wireless-Alarm-System

[2] Product website for ABUS proximity chip key

https://www.abus.com/eng/Home-Security/Alarm-systems/Secvest-wireless-alarm-system/Control-devices-and-extensions/Proximity-Chip-Key

[3] MIFARE Classic Tool - MCT
https://play.google.com/store/apps/details?id=de.syss.MifareClassicTool

[4] GitHub repository of ChameleonMini
https://github.com/emsec/ChameleonMini

[5] OBO Hands RFID/NFC Reader/Writer
https://www.amazon.de/dp/B07DHL9XQ4/

[6] SySS Proof-of-Concept Video: ABUS Secvest Proximity Key Cloning PoC
Attack
https://youtu.be/sPyXTQXTEcQ

[7] SySS Security Advisory SYSS-2019-005

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-005.txt

[8] SySS GmbH, SySS Responsible Disclosure Policy
https://www.syss.de/en/news/responsible-disclosure-policy/



Credits:

This security vulnerability was found by Matthias Deeg and Gerhard
Klostermeier of SySS GmbH.

E-Mail: matthias.deeg (at) syss.de
Public Key:
https://www.syss.de/fileadmin/dokumente/Materialien/PGPKeys/Matthias_Deeg.asc
Key fingerprint = D1F0 A035 F06C E675 CDB9 0514 D9A4 BF6A 34AD 4DAB

E-Mail: gerhard.klostermeier (at) syss.de
Public Key:
https://www.syss.de/fileadmin/dokumente/PGPKeys/Gerhard_Klostermeier.asc
Key fingerprint = 8A9E 75CC D510 4FF6 8DB5 CC30

[FD] [SYSS-2019-021]: WolfVision Cynap - Use of Hard-coded Cryptographic Key (CWE-321)

2019-07-05 Thread Matthias Deeg
Advisory ID: SYSS-2019-021

Product: Cynap

Manufacturer: WolfVision

Affected Version(s): 1.18g, 1.28j

Tested Version(s): 1.18g, 1.28j

Vulnerability Type: Use of Hard-coded Cryptographic Key (CWE-321)

Risk Level: High

Solution Status: Fixed

Manufacturer Notification: 2019-05-03

Solution Date: 2019-06-19

Public Disclosure: 2019-07-04

CVE Reference: Not assigned yet

Authors of Advisory: Manuel Stotz, Gerhard Klostermeier (SySS GmbH)







Overview:



WolfVision Cynap is a wireless collaboration and presentation system.



The manufacturer describes the product as follows [1]:



"Cynap is a stand-alone all-in-one wireless collaboration and

presentation system which includes a built-in media player, web

conferencing, on-board recording and streaming , BYOD screen sharing

for all mobile devices, and annotation functionality, making it the

ideal device to form the centrepiece of new and adapted classrooms and

meeting spaces."



Due to the use of a hard-coded cryptographic key, an attacker can

generate support PINs for resetting the administrative user password in

order to gain administrative access to the device.







Vulnerability Details:



SySS GmbH found out that the WolfVision Cynap wireless collaboration

and presentation system uses a static, hard-coded cryptographic secret

for generating support PINs used for the provided 'forgot password'

functionality.



By knowing this static secret and the corresponding algorithm for

calculating support PINs, an attacker can reset the password of the

administrative user account "ADMIN" and thus gain unauthorized access to

the affected Cynap device via a network connection.







Proof of Concept (PoC):



SySS GmbH developed a software tool for generating support PINs either

in online or offline mode.



The following output of the software tools illustrates a successful

attack resulting in a reset password for the administrative user

account "ADMIN".



$ python ./wolfvision_cynap_keygen.py --online 192.168.40.109

WolfVision vSolution Cynap Keygen

   by

  Manuel Stotz

  Gerhard Klostermeier



[*] Launch keygen in online mode ... [OK]

[*] Gathering data ... [OK]

[*] Serialnumber: 

[*] Support PIN: 447301

[*] Generating new Support PIN ... [OK]

[+] New Support PIN: 723247

[*] Account: ADMIN

[*] Password: Password

[*] Bye!



A successful attack against a vulnerable WolfVision Cynap device gaining

administrative access is demonstrated in our SySS PoC video

"Administrating WolfVision Cynap the Hacker's Way" [5].







Solution:



Install the firmware version 1.30j provided by the manufacturer

WolfVision [2].







Disclosure Timeline:



2019-05-03: Vulnerability reported to manufacturer

2019-05-10: Vulnerability reported to manufacturer again

2019-05-13: Manufacturer confirms receipt of security advisory

2019-05-31: Manufacturer schedules firmware update 1.30j with fix for

the reported security issue

2019-06-19: Release of firmware update 1.30j including security fix

2019-07-04: Public release of SySS security advisory







References:



[1] Product website for WolfVision Cynap


https://www.wolfvision.com/vsolution/index.php/en/presentation-systems/cynap/cynap

[2] WolfVision firmware downloads

https://wolfvision.com/vsolution/index.php/de/support/downloads

[3] SySS Security Advisory SYSS-2019-021


https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-021.txt

[4] SySS Responsible Disclosure Policy

https://www.syss.de/en/responsible-disclosure-policy/

[5] SySS Proof-of-Concept Video "Administrating WolfVision Cynap the
Hacker's Way"

https://youtu.be/veEtiYAWvMY







Credits:



This security vulnerability was found by Manuel Stotz and Gerhard

Klostermeier of SySS GmbH.



E-Mail: manuel.stotz (at) syss.de

Public Key: https://www.syss.de/fileadmin/dokumente/PGPKeys/Manuel_Stotz.asc

Key fingerprint = F051 5B74 7E70 193E 7F66 0133 E790 F68A BCE6 8C6D



E-Mail: gerhard.klostermeier (at) syss.de

Public Key:
https://www.syss.de/fileadmin/dokumente/PGPKeys/Gerhard_Klostermeier.asc

Key fingerprint = 8A9E 75CC D510 4FF6 8DB5 CC30 3802 3AAB 573E B2E7







Disclaimer:



The information provided in this security advisory is provided "as is"

and without warranty of any kind. Details of this security advisory may

be updated in order to 

[FD] [SYSS-2019-004]: ABUS Secvest (FUAA50000) - Message Transmission - Unchecked Error Condition (CWE-391) (CVE-2019-14261)

2019-07-26 Thread Matthias Deeg
Advisory ID: SYSS-2019-004
Product: ABUS Secvest (FUAA5)
Manufacturer: ABUS
Affected Version(s): v3.01.01
Tested Version(s): v3.01.01
Vulnerability Type: Message Transmission - Unchecked Error Condition
(CWE-391)
Risk Level: High
Solution Status: Open
Manufacturer Notification: 2019-03-02
Solution Date: -
Public Disclosure: 2019-07-26
CVE Reference: CVE-2019-14261
Authors of Advisory: Matthias Deeg (SySS GmbH), Thomas Detert



Overview:

ABUS Secvest (FUAA5) is a wireless alarm system with different
features.

Some of the supported features as described by the manufacturer are
(see [1]):

"
* Convenient operation via the app (Android/iOS), integrated web
  browser and also at the alarm panel
* For up to 50 users with freely selectable control options
  (code/chip key/remote control)
* Active intrusion protection in combination with additional mechatronic
  wireless window/door locks
* Video verification of alarms via email, push notifications or via the
  app
* Up to 48 individually identifiable wireless detectors, eight control
  panels, 50 remote controls
* Integrated dialling device
* VdS Home certified and EN 50131-1 Level 2
* Alarm verification via the integration of up to six IP cameras
* 32 additional wireless outputs for flexible event control
* Switching to monitoring station via protocols possible
"

Due to an insufficient implementation of the jamming detection, an
attacker is able to suppress correctly received RF messages sent between
wireless peripheral components, for example wireless detectors or remote
controls, and the ABUS Secvest alarm central.



Vulnerability Details:

Thomas Detert found out that the jamming detection of the ABUS alarm
central does not detect short jamming signals that are shorter than
normal ABUS RF messages.

Thus, an attacker is able to perform a "reactive jamming" attack. The
reactive jamming simply detects the start of a RF message sent by a
component of the ABUS Secvest wireless alarm system, for instance a
wireless motion detector (FUBW5) or a remote control (FUBE50014 or
FUBE50015), and overlays it with random data before the original RF
message ends. Thereby, the receiver (alarm central) is not able to
properly decode the original transmitted signal.

This enables an attacker to suppress correctly received RF messages of
the wireless alarm system in an unauthorized manner, for instance status
messages sent by a detector indicating an intrusion.



Proof of Concept (PoC):

Thomas Detert developed a Teensy-based PoC tool using a CC1101 sub-1GHz
transceiver that allows suppressing arming the alarm system in an
unauthorized way. He provided his tool including documentation and
source to SySS GmbH for responsible disclosure purposes.

SySS GmbH could successfully perform the described reactive jamming attack
against an ABUS Secvest wireless alarm system. RF messages sent by the
configured ABUS Secvest components FUBE50015 (remote control), FUBW5
(motion detector), and FUMK5W (magnetic contact detector) were
successfully suppressed and no alarm was triggered.



Solution:

SySS GmbH is not aware of a solution for this reported security
vulnerability.



Disclosure Timeline:

2019-03-02: Vulnerability reported to manufacturer
2019-07-26: Public release of security advisory



References:

[1] Product website for ABUS Secvest wireless alarm system

https://www.abus.com/eng/Home-Security/Alarm-systems/Secvest-wireless-alarm-system/Alarm-panels-and-kits/Secvest-Wireless-Alarm-System
[2] SySS Security Advisory SYSS-2019-004

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-004.txt
[3] SySS GmbH, SySS Responsible Disclosure Policy
https://www.syss.de/en/news/responsible-disclosure-policy/



Credits:

This security vulnerability was found by Thomas Detert.

Mr. Detert reported his finding to SySS GmbH where it was verified and
later reported to the manufacturer by Matthias Deeg.

E-Mail: matthias.deeg (at) syss.de
Public Key:
https://www.syss.de/fileadmin/dokumente/Materialien/PGPKeys/Matthias_Deeg.asc
Key fingerprint = D1F0 A035 F06C E675 CDB9 0514 D9A4 BF6A 34AD 4DAB



Disclaimer:

The information provided in this security advisory is provided "as is"
and without warranty of any kind. Details of this security advisory may
be updated in order to provide as accurate information as possible. The
latest version of this 

[FD] UPDATE: [SYSS-2019-021]: WolfVision Cynap - Use of Hard-coded Cryptographic Key (CWE-321) [CVE-2019-13352]

2019-07-09 Thread Matthias Deeg
Advisory ID: SYSS-2019-021
Product: Cynap
Manufacturer: WolfVision
Affected Version(s): 1.18g, 1.28j
Tested Version(s): 1.18g, 1.28j
Vulnerability Type: Use of Hard-coded Cryptographic Key (CWE-321)
Risk Level: High
Solution Status: Fixed
Manufacturer Notification: 2019-05-03
Solution Date: 2019-06-19
Public Disclosure: 2019-07-04
CVE Reference: CVE-2019-13352
Authors of Advisory: Manuel Stotz, Gerhard Klostermeier (SySS GmbH)



Overview:

WolfVision Cynap is a wireless collaboration and presentation system.

The manufacturer describes the product as follows [1]:

"Cynap is a stand-alone all-in-one wireless collaboration and
presentation system which includes a built-in media player, web
conferencing, on-board recording and streaming , BYOD screen sharing
for all mobile devices, and annotation functionality, making it the
ideal device to form the centrepiece of new and adapted classrooms and
meeting spaces."

Due to the use of a hard-coded cryptographic key, an attacker can
generate support PINs for resetting the administrative user password in
order to gain administrative access to the device.



Vulnerability Details:

SySS GmbH found out that the WolfVision Cynap wireless collaboration
and presentation system uses a static, hard-coded cryptographic secret
for generating support PINs used for the provided 'forgot password'
functionality.

By knowing this static secret and the corresponding algorithm for
calculating support PINs, an attacker can reset the password of the
administrative user account "ADMIN" and thus gain unauthorized access to
the affected Cynap device via a network connection.



Proof of Concept (PoC):

SySS GmbH developed a software tool for generating support PINs either
in online or offline mode.

The following output of the software tools illustrates a successful
attack resulting in a reset password for the administrative user
account "ADMIN".

$ python ./wolfvision_cynap_keygen.py --online 192.168.40.109
WolfVision vSolution Cynap Keygen
   by
  Manuel Stotz
  Gerhard Klostermeier

[*] Launch keygen in online mode ... [OK]
[*] Gathering data ... [OK]
[*] Serialnumber: 
[*] Support PIN: 447301
[*] Generating new Support PIN ... [OK]
[+] New Support PIN: 723247
[*] Account: ADMIN
[*] Password: Password
[*] Bye!

A successful attack against a vulnerable WolfVision Cynap device gaining
administrative access is demonstrated in our SySS PoC video
"Administrating WolfVision Cynap the Hacker's Way" [5].



Solution:

Install the firmware version 1.30j provided by the manufacturer
WolfVision [2].



Disclosure Timeline:

2019-05-03: Vulnerability reported to manufacturer
2019-05-10: Vulnerability reported to manufacturer again
2019-05-13: Manufacturer confirms receipt of security advisory
2019-05-31: Manufacturer schedules firmware update 1.30j with fix for
the reported security issue
2019-06-19: Release of firmware update 1.30j including security fix
2019-07-04: Public release of SySS security advisory
2019-07-08: Release of updated security advisory with assigned CVE ID



References:

[1] Product website for WolfVision Cynap

https://www.wolfvision.com/vsolution/index.php/en/presentation-systems/cynap/cynap
[2] WolfVision firmware downloads
https://wolfvision.com/vsolution/index.php/de/support/downloads
[3] SySS Security Advisory SYSS-2019-021

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-021.txt
[4] SySS Responsible Disclosure Policy
https://www.syss.de/en/responsible-disclosure-policy/
[5] SySS Proof-of-Concept Video "Administrating WolfVision Cynap the
Hacker's Way"
https://youtu.be/veEtiYAWvMY



Credits:

This security vulnerability was found by Manuel Stotz and Gerhard
Klostermeier of SySS GmbH.

E-Mail: manuel.stotz (at) syss.de
Public Key: https://www.syss.de/fileadmin/dokumente/PGPKeys/Manuel_Stotz.asc
Key fingerprint = F051 5B74 7E70 193E 7F66 0133 E790 F68A BCE6 8C6D

E-Mail: gerhard.klostermeier (at) syss.de
Public Key:
https://www.syss.de/fileadmin/dokumente/PGPKeys/Gerhard_Klostermeier.asc
Key fingerprint = 8A9E 75CC D510 4FF6 8DB5 CC30 3802 3AAB 573E B2E7



Disclaimer:

The information provided in this security advisory is provided "as is"
and without warranty of any kind. Details of this security advisory may
be updated in order to provide as accurate information as possible. The
latest version of 

[FD] [SYSS-2019-027]: Inateck BCST-60 Barcode Scanner - Keystroke Injection Vulnerability (CVE-2019-12503)

2019-11-29 Thread Matthias Deeg
Advisory ID: SYSS-2019-027
Product: BCST-60 Barcode Scanner
Manufacturer: Inateck
Affected Version(s): BCST-60
Tested Version(s): BCST-60
Vulnerability Type: Cryptographic Issues (CWE-310)
Keystroke Injection Vulnerability
Risk Level: High
Solution Status: Open
Manufacturer Notification: 2019-05-22
Solution Date: -
Public Disclosure: 2019-11-28
CVE Reference: CVE-2019-12503
Author of Advisory: Matthias Deeg (SySS GmbH)



Overview:

Inateck BCST-60 is a barcode scanner that can be either used wirelessly
using 2.4 GHz radio communication or wired via USB.

The manufacturer describes the product as follows [1]:

"With a 2.4G wireless connection, avoid the troubles of Bluetooth
pairing. Inateck BCST-60 is a leading product among scanners in the
field of large transmission ranges and battery endurance. What's more,
it can read barcodes at extreme angles. Whether you need barcode
scanning at your retail POS, at a hospital patient's bedside, on the
manufacturing production line or your warehouse, the Inateck BCST-60
will be a great fit for your specific needs."

Due to an insecure implementation of the data communication, the
wireless barcode scanner Inateck BCST-60 is vulnerable to keystroke
injection attacks.



Vulnerability Details:

SySS GmbH found out that the wireless barcode scanner Inateck BCST-60 is
vulnerable to keystroke injection attacks.

An attacker can analyze the unencrypted and unauthenticated data packets
of the 2.4 GHz radio communication sent by the wireless barcode scanner
to the receiver (USB dongle) in order to learn the used protocol. By
knowing the used data protocol, it is possible to send packets to the
USB dongle (receiver) of a target system, containing attacker-controlled
keystrokes or keystroke sequences.



Proof of Concept (PoC):

SySS GmbH could successfully perform keystroke injection attacks against
the wireless barcode scanner Inateck BCST-60 using a developed
proof-of-concept software tool in combination with the USB radio dongle
Crazyradio PA and the nrf-research-firmware by Marc Newlin [2, 3].



Solution:

SySS GmbH is not aware of a solution for this reported security
vulnerability.



Disclosure Timeline:

2019-05-22: Vulnerability reported to manufacturer
2019-11-28: Public release of security advisory



References:

[1] Product website for Inateck BCST-60 barcode scanner

https://www.inateck.com/bcst-60-2-4ghz-wireless-barcode-scanner-with-35m-range.html
[2] Product website for Crazyradio PA
https://www.bitcraze.io/crazyradio-pa/
[3] nRF24 research firmware and tools by Marc Newlin
https://github.com/marcnewlin/presentation-clickers
[4] SySS Security Advisory SYSS-2019-027

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-027.txt
[5] SySS Responsible Disclosure Policy
https://www.syss.de/en/responsible-disclosure-policy/



Credits:

This security vulnerability was found by Matthias Deeg of SySS GmbH.

E-Mail: matthias.deeg (at) syss.de
Public Key:
https://www.syss.de/fileadmin/dokumente/PGPKeys/Matthias_Deeg.asc
Key fingerprint = D1F0 A035 F06C E675 CDB9 0514 D9A4 BF6A 34AD 4DAB



Disclaimer:

The information provided in this security advisory is provided "as is"
and without warranty of any kind. Details of this security advisory may
be updated in order to provide as accurate information as possible. The
latest version of this security advisory is available on the SySS Web
site.



Copyright:

Creative Commons - Attribution (by) - Version 3.0
URL: http://creativecommons.org/licenses/by/3.0/deed.en




signature.asc
Description: OpenPGP digital signature

___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

[FD] [SYSS-2019-033]: Microsoft Designer Bluetooth Desktop - Insufficient Protection of Code (Firmware) and Data (Cryptographic Key)

2019-10-11 Thread Matthias Deeg
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Advisory ID: SYSS-2019-033
Product: Designer Bluetooth Desktop
Manufacturer: Microsoft
Affected Version(s): n/a
Tested Version(s): n/a
Vulnerability Type: Insufficient Protection of Code (Firmware) and
Data (Cryptographic Key)
Risk Level: Medium
Solution Status: Open
Manufacturer Notification: 2019-07-31
Solution Date: -
Public Disclosure: 2019-10-10
CVE Reference: Not assigned yet
Author of Advisory: Matthias Deeg (SySS GmbH)



Overview:

Microsoft Designer Bluetooth Desktop is a Bluetooth Low Energy (LE)
wireless desktop set consisting of a keyboard and a mouse.

The manufacturer describes the product as follows (see [1]):

"With its ultra-thin and modern look, the Designer Bluetooth Desktop
complements the look of your desk. It wirelessly pairs to your laptop or
tablet with the latest Bluetooth Smart technology - instantly connecting
without wires or dongles to manage. A full-sized keyboard with built-in
number pad and mouse will keep you productive at your desk."

Due to the insufficient protection of the flash memory of the keyboard,
an attacker with physical access has read and write access to the
firmware and the used cryptographic key.



Vulnerability Details:

SySS GmbH found out that the embedded flash memory of the Microsoft
Designer Bluetooth Desktop keyboard can be read and written via the SWD
(Serial Wire Debug) interface of the used nRF51822 Bluetooth SoC [2] as
the flash memory is not protected by the offered readback protection
feature.

Thus, an attacker with physical access to the keyboard can simply read
and write the nRF51822 flash memory contents and either extract the
cryptographic key (Bluetooth LE Long Term Key), for instance, to
perform further attacks against the wireless communication, or modify
the firmware.

However, even if the readback protection of the nRF51822 was enabled,
an attacker would be able to read and write the flash memory contents by
bypassing the security feature as described in [3] and [4] with
slightly more effort.



Proof of Concept (PoC):

SySS GmbH could successfully read the nRF51822 flash memory contents of
the Microsoft Designer Bluetooth Desktop keyboard via the SWD interface
using a SEGGER J-Link PRO [5] debug probe in combination with SEGGER
J-Link Commander and extract the currently used cryptographic key (Long
Term Key).



Solution:

According to Microsoft, the reported security issue does not meet
the bar for servicing via a security update [6].

The described security issue may be fixed in future versions of the
product.



Disclosure Timeline:

2019-07-31: Vulnerability reported to manufacturer
2019-08-01: Microsoft confirms receipt of security advisory
2019-08-06: Microsoft responds that the reported issue does not meet
the bar for servicing via a security update
2019-10-10: Public release of SySS security advisory



References:

[1] Product website for Microsoft Designer Bluetooth Desktop

https://www.microsoft.com/accessories/en-us/products/keyboards/designer-bluetooth-desktop/7n9-1
[2] nRF51822 Product Specification v3.1
https://infocenter.nordicsemi.com/pdf/nRF51822_PS_v3.1.pdf
[3] Kris Brosch, Include Security, Firmware dumping technique for an ARM
Cortex-M0 SoC, 2015

https://blog.includesecurity.com/2015/11/NordicSemi-ARM-SoC-Firmware-dumping-technique.html
[4] Andrew Tierney, Pen Test Partners, NRF51822 code readout protection
bypass - a how-to, 2018

https://www.pentestpartners.com/security-blog/nrf51822-code-readout-protection-bypass-a-how-to/
[5] Product website for Segger J-Link PRO
https://www.segger.com/products/debug-probes/j-link/models/j-link-pro/
[6] Microsoft Vulnerability Severity Classification for Windows
https://aka.ms/windowsbugbar
[7] SySS Security Advisory SYSS-2019-033

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-033.txt
[8] SySS GmbH, SySS Responsible Disclosure Policy
https://www.syss.de/en/news/responsible-disclosure-policy/



Credits:

This security vulnerability was found by Matthias Deeg of SySS GmbH.

E-Mail: matthias.deeg (at) syss.de
Public Key:
https://www.syss.de/fileadmin/dokumente/Materialien/PGPKeys/Matthias_Deeg.asc
Key fingerprint = D1F0 A035 F06C E675 CDB9 0514 D9A4 BF6A 34AD 4DAB



Disclaimer:

The information provided in this security advisory is provided "as is"
and without 

[FD] [SYSS-2019-034]: Microsoft Surface Keyboard - Insufficient Protection of Code (Firmware) and Data (Cryptographic Key)

2019-10-11 Thread Matthias Deeg
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Advisory ID: SYSS-2019-034
Product: Surface Keyboard
Manufacturer: Microsoft
Affected Version(s): WS2-5
Tested Version(s): WS2-5
Vulnerability Type: Insufficient Protection of Code (Firmware) and
Data (Cryptographic Key)
Risk Level: Medium
Solution Status: Open
Manufacturer Notification: 2019-07-31
Solution Date: -
Public Disclosure: 2019-10-10
CVE Reference: Not assigned yet
Author of Advisory: Matthias Deeg (SySS GmbH)



Overview:

Microsoft Surface Keyboard is a Bluetooth Low Energy (LE) keyboard.

The manufacturer describes the product as follows (see [1]):

"Meticulously crafted, just like your Surface
Enjoy the solid feel of the keyboard under your fingers as you work.
And it pairs seamlessly with your Surface with Wireless Bluetooth - at a
range of up to 50 feet - and battery power to last a full year."

Due to the insufficient protection of the flash memory of the keyboard,
an attacker with physical access has read and write access to the
firmware and the used cryptographic key.



Vulnerability Details:

SySS GmbH found out that the embedded flash memory of the Bluetooth LE
Microsoft Surface Keyboard can be read and written via the SWD (Serial
Wire Debug) interface of the used nRF51822 Bluetooth SoC [2] as the
flash memory is not protected by the offered readback protection
feature.

Thus, an attacker with physical access to the keyboard can simply read
and write the nRF51822 flash memory contents and either extract the
cryptographic key (Bluetooth LE Long Term Key), for instance, to
perform further attacks against the wireless communication, or modify
the firmware.

However, even if the readback protection of the nRF51822 was enabled,
an attacker would be able to read and write the flash memory contents by
bypassing the security feature as described in [3] and [4] with
slightly more effort.



Proof of Concept (PoC):

SySS GmbH could successfully read the nRF51822 flash memory contents of
the Microsoft Surface Keyboard via the SWD interface using a SEGGER
J-Link PRO [5] debug probe in combination with SEGGER J-Link Commander
and extract the currently used cryptographic key (Long Term Key).



Solution:

According to Microsoft, the reported security issue does not meet
the bar for servicing via a security update [6].

The described security issue may be fixed in future versions of the
product.



Disclosure Timeline:

2019-07-31: Vulnerability reported to manufacturer
2019-08-01: Microsoft confirms receipt of security advisory
2019-08-06: Microsoft responds that the reported issue does not meet
the bar for servicing via a security update
2019-10-10: Public release of SySS security advisory



References:

[1] Product website for Microsoft Surface Keyboard
https://www.microsoft.com/en-us/p/surface-keyboard/8r3rqvvflp4k
[2] nRF51822 Product Specification v3.1
https://infocenter.nordicsemi.com/pdf/nRF51822_PS_v3.1.pdf
[3] Kris Brosch, Include Security, Firmware dumping technique for an ARM
Cortex-M0 SoC, 2015

https://blog.includesecurity.com/2015/11/NordicSemi-ARM-SoC-Firmware-dumping-technique.html
[4] Andrew Tierney, Pen Test Partners, NRF51822 code readout protection
bypass - a how-to, 2018

https://www.pentestpartners.com/security-blog/nrf51822-code-readout-protection-bypass-a-how-to/
[5] Product website for Segger J-Link PRO
https://www.segger.com/products/debug-probes/j-link/models/j-link-pro/
[6] Microsoft Vulnerability Severity Classification for Windows
https://aka.ms/windowsbugbar
[7] SySS Security Advisory SYSS-2019-034

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-034.txt
[8] SySS GmbH, SySS Responsible Disclosure Policy
https://www.syss.de/en/news/responsible-disclosure-policy/



Credits:

This security vulnerability was found by Matthias Deeg of SySS GmbH.

E-Mail: matthias.deeg (at) syss.de
Public Key:
https://www.syss.de/fileadmin/dokumente/Materialien/PGPKeys/Matthias_Deeg.asc
Key fingerprint = D1F0 A035 F06C E675 CDB9 0514 D9A4 BF6A 34AD 4DAB



Disclaimer:

The information provided in this security advisory is provided "as is"
and without warranty of any kind. Details of this security advisory may
be updated in order to provide as accurate information as possible. The
latest version of this security advisory is available 

[FD] [SYSS-2019-035]: Microsoft Surface Mouse - Insufficient Protection of Code (Firmware) and Data (Cryptographic Key)

2019-10-11 Thread Matthias Deeg
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Advisory ID: SYSS-2019-035
Product: Surface Mouse
Manufacturer: Microsoft
Affected Version(s): WS3-2
Tested Version(s): WS3-2
Vulnerability Type: Insufficient Protection of Code (Firmware) and
Data (Cryptographic Key)
Risk Level: Medium
Solution Status: Open
Manufacturer Notification: 2019-07-31
Solution Date: -
Public Disclosure: 2019-10-10
CVE Reference: Not assigned yet
Author of Advisory: Matthias Deeg (SySS GmbH)



Overview:

Microsoft Surface Mouse is a Bluetooth Low Energy (LE) mouse.

The manufacturer describes the product as follows (see [1]):

"Sculpted for your hand and designed for an elegantly simple work space,
Mouse is the perfect partner to your docked Surface and Keyboard. It was
designed to match the sleek aesthetic and exceptional performance of
your Surface. The metal scroll wheel feels solid under your finger,
and the shape of the body fits perfectly in your hand."

Due to the insufficient protection of the flash memory of the mouse, an
attacker with physical access has read and write access to the firmware
and the used cryptographic key.



Vulnerability Details:

SySS GmbH found out that the embedded flash memory of the Bluetooth LE
Microsoft Surface Mouse can be read and written via the SWD (Serial Wire
Debug) interface of the used nRF51822 Bluetooth SoC [2] as the flash
memory is not protected by the offered readback protection feature.

Thus, an attacker with physical access to the mouse can simply read and
write the nRF51822 flash memory contents and either extract the
cryptographic key (Bluetooth LE Long Term Key), for instance to perform
further attacks against the wireless communication, or modify the
firmware.

However, even if the readback protection of the nRF51822 was enabled,
an attacker would be able to read and write the flash memory contents by
bypassing the security feature as described in [3] and [4] with
slightly more effort.



Proof of Concept (PoC):

SySS GmbH could successfully read the nRF51822 flash memory contents of
the Microsoft Surface Mouse via the SWD interface using a SEGGER J-Link
PRO [5] debug probe in combination with SEGGER J-Link Commander and
extract the currently used cryptographic key (Long Term Key).



Solution:

According to Microsoft, the reported security issue does not meet
the bar for servicing via a security update [6].

The described security issue may be fixed in future versions of the
product.



Disclosure Timeline:

2019-07-31: Vulnerability reported to manufacturer
2019-08-01: Microsoft confirms receipt of security advisory
2019-08-06: Microsoft responds that the reported issue does not meet
the bar for servicing via a security update
2019-10-10: Public release of SySS security advisory



References:

[1] Product website for Microsoft Surface Mouse
https://www.microsoft.com/en-us/store/d/surface-mouse/8qbtdr3q4rpw
[2] nRF51822 Product Specification v3.1
https://infocenter.nordicsemi.com/pdf/nRF51822_PS_v3.1.pdf
[3] Kris Brosch, Include Security, Firmware dumping technique for an ARM
Cortex-M0 SoC, 2015

https://blog.includesecurity.com/2015/11/NordicSemi-ARM-SoC-Firmware-dumping-technique.html
[4] Andrew Tierney, Pen Test Partners, NRF51822 code readout protection
bypass - a how-to, 2018

https://www.pentestpartners.com/security-blog/nrf51822-code-readout-protection-bypass-a-how-to/
[5] Product website for Segger J-Link PRO
https://www.segger.com/products/debug-probes/j-link/models/j-link-pro/
[6] Microsoft Vulnerability Severity Classification for Windows
https://aka.ms/windowsbugbar
[7] SySS Security Advisory SYSS-2019-035

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-035.txt
[8] SySS GmbH, SySS Responsible Disclosure Policy
https://www.syss.de/en/news/responsible-disclosure-policy/



Credits:

This security vulnerability was found by Matthias Deeg of SySS GmbH.

E-Mail: matthias.deeg (at) syss.de
Public Key:
https://www.syss.de/fileadmin/dokumente/Materialien/PGPKeys/Matthias_Deeg.asc
Key fingerprint = D1F0 A035 F06C E675 CDB9 0514 D9A4 BF6A 34AD 4DAB



Disclaimer:

The information provided in this security advisory is provided "as is"
and without warranty of any kind. Details of this security advisory may
be updated in order to provide as accurate information as possible. The
latest version of th

[FD] [SYSS_2020-014]: ABUS Secvest Wireless Control Device (FUBE50001) - Missing Encryption of Sensitive Data (CWE-311) (CVE-2020-14157)

2020-06-23 Thread Matthias Deeg
Advisory ID: SYSS-2020-014
Product: ABUS Secvest Wireless Control Device (FUBE50001)
Manufacturer: ABUS
Affected Version(s): N/A
Tested Version(s): N/A
Vulnerability Type: Missing Encryption of Sensitive Data (CWE-311)
Risk Level: High
Solution Status: Open
Manufacturer Notification: 2020-04-03
Solution Date: -
Public Disclosure: 2020-06-17
CVE Reference: CVE-2020-14157
Authors of Advisory: Michael Rüttgers, Thomas Detert,
 Matthias Deeg (SySS GmbH)



Overview:

ABUS Secvest Wireless Control Device (FUBE50001) is a wireless control
panel for the ABUS Secvest wireless alarm system.

Some of the device features as described by the manufacturer are
(see [1]):

"
* Easy operation via code or proximity keyfob
  The Secvest wireless control panel is an optional Secvest accessory.
  Every wireless control panel can be operated from your system via PIN
  code. It is possible to arm and disarm the panel via proximity keyfob.

* Flexible use in entrance areas
  Up to 8 control panels can be integrated into the alarm system. These
  additional modules can be placed in various areas of the building.
  This provides added convenience for you, because Secvest can be armed
  and disarmed directly on the wireless control panel, without the need
  to go back to the central alarm panel every time.
  In addition to internal arming or arming individual sub-areas, you can
  also switch a single output, such as the garage door, if desired.

* Secure wireless communication
  Thanks to a secure wireless communication procedure, this product is
  protected against ‘replay attacks’, as are the Secvest wireless alarm
  system and Secvest Touch alarm systems. This procedure for preventing
  third-party tampering exceeds the requirements of the “DIN EN 50131-1
  level 2” security standard.
"

Due to the missing encryption of the wireless communication, an attacker
is able to eavesdrop sensitive data as cleartext, for instance, used PINs
or proximity token IDs.



Vulnerability Details:

Michael Rüttgers found out that the wireless communication of the ABUS
Secvest Wireless Control Device (FUBE50001) for transmitting sensitive
data like PIN codes or IDs of used proximity chip keys (RFID tokens) is
not encrypted.

This security issue is related to the insecure wireless transmission of
sensitive data of the ABUS Secvest remote controls FUBE50014 and
FUBE50015 reported back in 2018 (see SySS security advisory
SYSS-2018-035 [2]).

Thus, an attacker observing radio signals of an ABUS FUBE50001
wireless control panel is able to see all sensitive data of transmitted
packets as cleartext and can analyze the used packet format and the
communication protocol.

For instance, this security issue could successfully be exploited to
sniff used PIN codes and used proximity chip key IDs.

By knowing the correct PIN code or the ID of a valid ABUS Secvest
proximity chip key, an attacker is able to disarm the wireless alarm
system in an unauthorized way.



Proof of Concept (PoC):

Michael Rüttgers, Thomas Detert, and Matthias Deeg developed different
PoC software tools, either for the RFCat-based radio dongle YARD Stick
One [3] in one version, or the GreatFet One neighbor Erica [4] in another
one, that allowed sniffing out used PIN codes or used proximity chip key
IDs when eavesdropping on the FUBE50001 wireless communication.

The following output exemplarily shows a successful PIN code sniffing
attack:

$ python2 abus_fube50001_pin_sniffer.py
ABUS Secvest FUBE50001 PIN Code Sniffer PoC - SySS GmbH (c) 2020
by Thomas Detert, Michael Rüttgers, and Matthias Deeg
---
[*] Listening for ABUS FUBE50001 packets ...
[*] Received packet:
f0f352b4ccb4ccd52aab52d2acd2d34d4cb34cb32b34d4b530f0f0f352b4ccb4ccd52aab52d2acd2d34d4cb34cb32b34d4b530f0f0f3117162f5
[*] Decoded packet : da0a077ed5c54900626b
[*] Received packet:
f0f352b4b32b4d352ad5332aab2cb34cd3332cccb4ccacb354acd2ab32aab54d30f0f0f352b4b32b4d352ad5332aab2cb34cd3332cccb4ccacb354ac
[*] Decoded packet : da86937707e4884040a0c8ecff005e1fb9
[*] Detected FUBE50001 packet with FUBE50001 PIN
[+] Sniffed PIN code: 1337
(...)

An example of a successful sniffing attack regarding the ID of an ABUS
proximity chip key is illustrated in the following output:

$ python2 abus_fube50001_chip_key_id_sniffer.py
ABUS Secvest FUBE50001 Proximity Chip Key ID Sniffer PoC - SySS GmbH (c)
2020
by Thomas Detert, Michael Rüttgers, and Matthias Deeg
---
[*] Listening for ABUS FUBE50001 packets ...
[*] Received packet:
f0f352b4b332b2cad52accd554d34cb32cccd2b34ab2cd2b2d4ad32ad2aacaacd32b30f0f0f3057c0764bf788b6ce7d0de43f6c1cb71e7374b7bd7c7a1abe567
[*] Decoded packet: da81937707e488404018b9165b475f3c46
[*] Detected FUBE50001 packet with proximity token ID
[

[FD] [SYSS-2020-015]: ABUS Secvest Hybrid module (FUMO50110) - Authentication Bypass Using an Alternate Path or Channel (CWE-288) (CVE-2020-14158)

2020-07-30 Thread Matthias Deeg
Advisory ID: SYSS-2020-015
Product: ABUS Secvest Hybrid module (FUMO50110)
Manufacturer: ABUS
Affected Version(s): N/A
Tested Version(s): N/A
Vulnerability Type: Authentication Bypass Using an Alternate Path or
Channel (CWE-288)
Risk Level: High
Solution Status: Open
Manufacturer Notification: 2020-04-03
Solution Date: -
Public Disclosure: 2020-07-30
CVE Reference: CVE-2020-14158
Authors of Advisory: Michael Rüttgers, Thomas Detert,
 Matthias Deeg (SySS GmbH)



Overview:

The ABUS Secvest Hybrid module is an expansion module that allows
to bridge between the ABUS Secvest alarm panel [1] and further wired
systems.

Some of the supported features as described by the manufacturer are
(see [2]):

"
* The hybrid module turns wireless into wired and wired into
  wireless. And alarm systems into combined security systems. By
  connecting to the ABUS wAppLoxx, the property benefits from intelligent
  access management while simultaneously eliminating false alarms.
* In combination with Secvest, the hybrid module can also be used to
  implement numerous smart home scenarios. Garage doors, household lighting
  or rolling shutters can be operated in this way, for example.
"

Due to missing security features regarding confidentiality and
integrity of the used radio communication, different radio-based attacks
are possible.



Vulnerability Details:

The hybrid module does not have any security mechanism that ensures
confidentiality or integrity of RF packets that are exchanged between
the ABUS Secvest alarm panel and the ABUS Secvest Hybrid module. Thus,
an attacker can spoof messages of the ABUS Secvest Hybrid module based
on sniffed status RF packets that are issued by the ABUS Secvest Hybrid
module on a regularly basis (~2.5 minutes).

One of the suggested use cases in [3] (page 27) is the link of a
wAppLoxx to the ABUS Secvest alarm panel via the ABUS Secvest Hybrid
module.

In the intended use case, this allows to disarm the ABUS Secvest
panel simultaneously when access by the wAppLoxx system is granted to
a properly authenticated user.

By spoofing the ABUS Secvest Hybrid module RF messages, an attacker is
able to bypass the authentication of wAppLoxx in such a system
configuration without the need of any user interaction.
For clarity, the authentication of the wAppLoxx cylinder itself is not
influenced by this attack, and an attacker still needs to find access
to the protected object.

The input channels of the ABUS Secvest Hybrid module are simply mapped
to a 4-byte field in the RF packages. Modifying those bytes allows an
attacker to simulate any change on the ABUS Secvest Hybrid module
inputs.



Proof of Concept (PoC):

Michael Rüttgers and Thomas Detert developed a PoC tool using the
RFCat-based radio dongle YARD Stick One [4] that allows spoofing RF
packets and thus bypassing the authentication of wAppLoxx in the
described system configuration. They provided their tool including
documentation and source code to SySS GmbH for responsible disclosure
purposes.

SySS GmbH could successfully perform the described authentication bypass
attack against an ABUS Secvest wireless alarm system used with the ABUS
Secvest Hybrid module (FUMO50110).

The described spoofing attack is demonstrated in the SySS
proof of concept video titled "ABUS Secvest Spoofing Attack" which is
available on the SySS YouTube Channel "Pentest TV" [7].



Solution:

SySS GmbH is not aware of a solution for this reported security
vulnerability.



Disclosure Timeline:

2020-04-03: Vulnerability reported to manufacturer
2020-07-30: Public release of security advisory



References:

[1] Product Website for ABUS Secvest Wireless Alarm System

https://www.abus.com/eng/Home-Security/Alarm-systems/Secvest-wireless-alarm-system/Alarm-panels-and-kits/Secvest-Wireless-Alarm-System
[2] Product Website for ABUS Secvest Hybrid Module

https://www.abus.com/uk/Home-Security/Alarm-systems/Secvest-wireless-alarm-system/Control-devices-and-extensions/Secvest-Hybrid-module
[3] Installation Instructions and User Guide

https://www.abus.com/var/ImagesPIM/d110001/medias/docus/22/FUMO50110_BDA_INT_1_3.pdf
[4] Product Website YARD Stick One
https://greatscottgadgets.com/yardstickone/
[5] SySS Security Advisory SYSS-2020-015

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-015.txt
[6] SySS GmbH, SySS Responsible Disclosure Policy
https://www.syss.de/en/news/responsible-disclosure-policy/
[7] SySS Proof of Concept Video: ABUS Sec

[FD] [SYSS-2021-007]: Protectimus SLIM NFC - External Control of System or Configuration Setting (CWE-15) (CVE-2021-32033)

2021-06-18 Thread Matthias Deeg
Advisory ID: SYSS-2021-007
Product: Protectimus SLIM NFC
Manufacturer: Protectimus
Affected Version(s): Hardware Scheme 70 / Software Version 10.01
Tested Version(s): Hardware Scheme 70 / Software Version 10.01
Vulnerability Type: External Control of System or Configuration Setting
(CWE-15)
"Time Traveler Attack"
Risk Level: Medium
Solution Status: Open
Manufacturer Notification: 2021-02-04
Solution Date: -
Public Disclosure: 2021-06-16
CVE Reference: CVE-2021-32033
Author of Advisory: Matthias Deeg (SySS GmbH)



Overview:

Protectimus SLIM NFC is a reprogrammable time-based one-time password
(TOTP) hardware token.

The manufacturer describes the product as follows (see [1]):

"
Protectimus SLIM mini is a new generation of reprogrammable TOTP
hardware tokens. They can be used in 2FA systems based on OATH
standards, and easily reflashed using an application installed on your
NFC-capable Android smartphone. It allows the user to determine the
OTP’s expires (30 or 60 seconds), and also set up a secret key.
"

Due to a design error, the time (internal real-time clock) of the
Protectimus SLIM TOTP hardware token can be set independently from the
used seed (secret key) for generating one-time passwords without any
required authentication.



Vulnerability Details:

When analyzing the Protectimus SLIM TOTP hardware token, Matthias Deeg
found out that the time used by the Protectimus SLIM TOTP hardware token
can be set independently from the used seed value for generating
time-based one-time passwords without requiring any authentication.

Thus, an attacker with short-time physical access to a Protectimus SLIM
token can set the internal real-time clock (RTC) to the future,
generate one-time passwords, and reset the clock to the current time.

This allows for generating valid future time-based one-time passwords
without having further access to the hardware token.



Proof of Concept (PoC):

For demonstrating the time traveler attack exploiting the described
security vulnerability, Matthias Deeg developed a Lua script for the
Proxmark3 [2].

The following output exemplarily shows a successful attack for
generating a valid future one-time password for an attacker-chosen point
in time against a vulnerable Protectimus SLIM TOTP hardware token:

[usb] pm3 --> script run hf_14a_protectimus_nfc -t 2021-03-14T13:37:00+01:00
[+] executing lua
/home/matt/research/proxmark3/client/luascripts/hf_14a_protectimus_nfc.lua
[+] args '-t 2021-03-14T13:37:00+01:00'
[+] Found token with UID 3F1323540E
[+] Set Unix time 1615725420
[!] Please power the token and press 

[+] The future OTP on 2021-03-14T13:37:00+01:00 (1615725420) is 303831
[+] Set Unix time 1612451460

[+] finished hf_14a_protectimus_nfc


A SySS proof of concept video illustrating this security Vulnerability
is available on our SySS Pentest TV YouTube channel [5].

The developed Lua script for Proxmark3 is available on our GitHub
site [6].



Solution:

SySS is not aware of a solution for the described security issue.



Disclosure Timeline:

2021-02-04: Vulnerability reported to manufacturer
2021-02-04: Manufacturer acknowledges receipt of security advisory and
asks for further information
2021-02-05: SySS provides further information to manufacturer
2021-06-16: Public release of security advisory



References:

[1] Product website for Protectimus SLIM NFC
https://www.protectimus.com/protectimus-slim-mini/
[2] Proxmark3 GitHub repository by the RFID Research Group
https://github.com/RfidResearchGroup/proxmark3
[3] SySS Security Advisory SYSS-2021-007

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-007.txt
[4] SySS GmbH, SySS Responsible Disclosure Policy
https://www.syss.de/en/responsible-disclosure-policy
[5] SySS Proof of Concept Video: To the Future and Back - Attacking a
TOTP Hardware Token
https://www.youtube.com/watch?v=C0pM6TIyvXI
[6] Protectimus SLIM NFC Lua script for Proxmark3
https://github.com/SySS-Research/protectimus-slim-proxmark3



Credits:

This security vulnerability was found by Matthias Deeg of SySS GmbH.

E-Mail: matthias.deeg (at) syss.de
Public Key:
https://www.syss.de/fileadmin/dokumente/Materialien/PGPKeys/Matthias_Deeg.asc
Key fingerprint = D1F0 A035 F06C E675 CDB9 0514 D9A4 BF6A 34AD 4DAB



Disclaimer:

The information provided in this security advisory is provi

[FD] [SYSS-2020-044]: Zoom - Exposure of Resource to Wrong Sphere (CWE-668) (CVE-2021-28133)

2021-03-19 Thread Matthias Deeg
Advisory ID: SYSS-2020-044
Product: Zoom
Manufacturer: Zoom Video Communications, Inc.
Affected Version(s): 5.4.3 (54779.1115)
 5.5.4 (13142.0301)
Tested Version(s): 5.4.3 (54779.1115)
   5.5.4 (13142.0301)
Vulnerability Type: Exposure of Resource to Wrong Sphere (CWE-668)
Risk Level: Medium
Solution Status: Open
Manufacturer Notification: 2020-12-02
Solution Date: -
Public Disclosure: 2021-03-18
CVE Reference: CVE-2021-28133
Authors of Advisory: Michael Strametz, Matthias Deeg



Overview:

Zoom is a video conferencing and messaging software with support for
many different devices.

Some of the supported features as described by the manufacturer are
(see [1]):

"
* Unparalleled usability
  Enable quick adoption with meeting capabilities that make it easy to
  start, join, and collaborate across any device.

* Join anywhere, on any device
  Zoom Meetings syncs with your calendar system and delivers streamlined
  enterprise-grade video conferencing from desktop and mobile.

* Powerful meeting security
  Robust security settings ensure disruption-free meetings. Encryption,
  role-based security, Passcode protection, Waiting Rooms and more.
"

Due to a security issue concerning the "share screen" functionality,
screen contents of applications which are not explicitly shared by the
screen-sharing user can be seen by other meeting participants.



Vulnerability Details:

When a Zoom user shares a specific application window via the "share
screen" functionality, other meeting participants can briefly see
contents of other application windows which were not explicitly shared.

The contents of not shared application windows can, for instance, be seen
for a short period of time by other users when those windows overlay the
shared application window and get into focus.

Depending on the unintentionally shared data, this short exposure of
screen contents may be a more or less severe security issue.

A participant of a Zoom meeting recording a meeting using a screen
recorder software may afterwards have access to sensitive data of
other users which is accessible in a few frames of the recorded video.



Proof of Concept (PoC):

SySS could successfully demonstrate the described attack concerning
screen recordings of Zoom meetings with unintentionally shared screen
contents both using the current Windows and Linux Zoom client software.

In this attack scenario, the two users Alice and Mallory are in the
same Zoom meeting and Alice shares her web browser window via the "share
screen" functionality.

Mallory records her whole desktop screen using a screen recorder
software, for instance SimpleScreenRecorder [3].

Between showing different things in her shared web browser window, Alice
uses another application whose application window happens to overlay
the shared web browser window.

The contents of this other application window, which is explicitly not
shared with Mallory, can sometimes briefly be seen by Mallory.

When watching the created screen recording, Mallory can pause the video
at will and thus see the unintentionally shared application window
contents from Alice.

A SySS proof of concept video illustrating this security issue is
available on our SySS Pentest TV YouTube channel [5].



Solution:

SySS GmbH is not aware of a fix for the described security issue.
Please contact the software manufacturer for further information.



Disclosure Timeline:

2020-12-02: Vulnerability reported to manufacturer
2020-12-02: Manufacturer acknowledges receipt of security advisory
2020-12-02: Manufacturer asks for more information
2020-12-03: SySS provides more information concerning the security issue
2020-12-03: Manufacturer confirms reproducing the security issue in both
the Windows and the Linux client and asks further questions
2020-12-04: SySS answers open questions
2020-12-04: Manufacturer responds and will look into the reported
security issue
2021-01-21: SySS asks for status update
2021-02-01: SySS asks for status update
2021-03-18: Public release of security advisory



References:

[1] Product Website for Zoom
https://zoom.us/
[2] SySS Security Advisory SYSS-2020-044

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-044.txt
[3] SySS GmbH, SySS Responsible Disclosure Policy
https://www.syss.de/en/responsible-disclosure-policy
[4] GitHub Website of SimpleScreenRecorder
https://github.com/MaartenBaert/ssr/
[5] SySS Proof of Concept Video: Zoom U

[FD] [SYSS-2022-001]: Verbatim Keypad Secure USB 3.2 Gen 1 Drive - Use of a Cryptographic Primitive with a Risky Implementation (CWE-1240) (CVE-2022-28384)

2022-06-11 Thread Matthias Deeg

Advisory ID:   SYSS-2022-001
Product:   Keypad Secure USB 3.2 Gen 1 Drive
Manufacturer:  Verbatim
Affected Version(s):   Part Number #49428
Tested Version(s): Part Number #49428
Vulnerability Type:Use of a Cryptographic Primitive with a Risky
   Implementation (CWE-1240)
Risk Level:High
Solution Status:   Open
Manufacturer Notification: 2022-01-27
Solution Date: -
Public Disclosure: 2022-06-08
CVE Reference: CVE-2022-28384
Author of Advisory:Matthias Deeg (SySS GmbH)



Overview:

The Verbatim Keypad Secure is a USB drive with AES 256-bit hardware
encryption and a built-in keypad for passcode entry.

The manufacturer describes the product as follows:

"The AES 256-bit Hardware Encryption seamlessly encrypts all data on the
drive in real-time with a built-in keypad for passcode input. The USB
Drive does not store passwords in the computer or system's volatile
memory making it far more secure than software encryption. Also, if it
falls into the wrong hands, the device will lock and require
re-formatting after 20 failed passcode attempts."[1]

Due to an insecure design, the Verbatim Keypad Secure USB drive is
vulnerable to an offline brute-force attack for finding out the correct
passcode, and thus gaining unauthorized access to the stored encrypted
data.



Vulnerability Details:

When analyzing the USB drive Verbatim Keypad Secure, Matthias Deeg found
out it uses an insecure design which allows for offline brute-force
attacks against the passcode.

The Verbatim Keypad Secure consists of the following four main parts:

1. An SSD in M.2 form factor (SSD controller MARVELL-88NV1120)
2. A USB-to-SATA bridge controller (INIC-3637EN)
3. An SPI flash memory chip (XT25F01D) containing the firmware of the
   INIC-3637EN
4. A keypad controller (unknown chip, marked "SW611 2121")

For encrypting the data stored on the SSD, the hardware AES engine of
the INIC-3637EN is used. More specifically, AES-256 in ECB (Electronic
Codebook) mode is used for data encryption, which is also a security
issue by itself described in SySS security advisory SYSS-2022-002[2].

The cryptographic key for the actual data encryption, the so-called data
encryption key (DEK), is stored in a special sector of the SSD which in
turn is encrypted using AES-256-ECB with a so-called key encryption key
(KEK).

This KEK is derived from the entered passcode which can be between five
and twelve digits long, and can be generated by the keypad controller.

When the unlock button is pressed on the Verbatim Keypad Secure, this
generated AES 256-bit key is transmitted via SPI communication from the
keypad controller to the USB-to-SATA bridge controller INIC-3637EN for
configuring the corresponding hardware AES engine.

For verifying the entered passcode, the firmware of the INIC-3637EN
reads and decrypts the special sector on the SSD with the provided KEK,
and checks specific data offsets for the known byte pattern (signature)
"0x20 0x49 0x4E 0x49" which represents the string " INI".

If this byte pattern could successfully be found, the entered passcode
and its derived AES key are very likely correct, and enable the firmware
access to the decrypted DEK which can then be used to decrypt the
actual SSD user data.

This described design of the Verbatim Keypad Secure allows for offline
brute-force attacks for finding the correct passcode. Because an
attacker can generate and observe the derived AES keys (KEK) of the
keypad for all possible passcodes, and then try to correctly decrypt the
data of the specific SSD sector. If the magic byte pattern " INI" can be
found in the expected places of the resulting plaintext, the correct
passcode was found, which then allows for gaining unauthorized access to
the encrypted user data.



Proof of Concept (PoC):

For demonstrating the offline brute-force attack, Matthias Deeg
developed a sample brute-forcing software tool which checks the complete
search space of all possible passcodes between five and twelve digits.



Solution:

SySS GmbH is not aware of a solution for the described security issue.



Disclosure Timeline:

2022-01-27: Vulnerability reported to manufacturer
2022-02-11: Vulnerability reported to manufacturer again
2022-03-07: Vulnerability reported to manufacturer again
2022-06-08: Public release of security advisory



References:

[1] Product website for Verbatim Keypad Secure

https:/

[FD] [SYSS-2022-005]: Verbatim Store 'n' Go Secure Portable HDD - Use of a Cryptographic Primitive with a Risky Implementation (CWE-1240) (CVE-2022-28384)

2022-06-11 Thread Matthias Deeg

Advisory ID:   SYSS-2022-005
Product:   Store 'n' Go Secure Portable HDD
Manufacturer:  Verbatim
Affected Version(s):   GD25LK01-3637-C VER4.0
Tested Version(s): GD25LK01-3637-C VER4.0
Vulnerability Type:Use of a Cryptographic Primitive with a Risky
   Implementation (CWE-1240)
Risk Level:High
Solution Status:   Open
Manufacturer Notification: 2022-01-31
Solution Date: -
Public Disclosure: 2022-06-08
CVE Reference: CVE-2022-28384
Author of Advisory:Matthias Deeg (SySS GmbH)



Overview:

The Verbatim Store 'n' Go Secure Portable HDD is a portable USB drive
with AES 256-bit hardware encryption and a built-in keypad for passcode
entry.

The manufacturer describes the product as follows:

"The AES 256-bit Hardware Encryption seamlessly encrypts all data on the
drive in real-time with a built-in keypad for password input. The SSD
does not store passwords in the computer or system's volatile memory
making it far more secure than software encryption. Also, if it falls
into the wrong hands, the SSD will lock and require re-formatting after
20 failed password attempts." [1]

Due to an insecure design, the Verbatim Store 'n' Go Secure Portable HDD
is vulnerable to an offline brute-force attack for finding out the
correct passcode, and thus gaining unauthorized access to the stored
encrypted data.



Vulnerability Details:

When analyzing the external SSD Verbatim Store 'n' Go Secure Portable
HDD, Matthias Deeg found out it uses an insecure design which allows for
offline brute-force attacks against the passcode.

The device consists of following four main parts:

1. a Toshiba SSD (MQ04ABF100)
2. an USB-to-SATA bridge controller (INIC-3637EN)
3. a SPI flash memory chip (XT25F01D) containing the firmware of the
   INIC-3637EN
4. a keypad controller (unknown chip, marked "SW611 2121")

For encrypting the data stored on the SSD, the hardware AES engine of
the INIC-3637EN is used. More specifically, AES-256 in ECB (Electronic
Codebook) mode is used for data encryption, which is also a security
issue by itself described in SySS security advisory SYSS-2022-002 [2].

The cryptographic key for the actual data encryption, the so-called data
encryption key (DEK) is stored in a special sector of the SSD which in
turn is encrypted using AES-256-ECB with a so-called key encryption key
(KEK).

This KEK is derived from the entered passcode which can be between five
and twelve digits long, and generated by the keypad controller.

When the unlock button is pressed on the Verbatim Store 'n' Go Secure
Portable HDD, this generated AES 256-bit key is transmitted via SPI
communication from the keypad controller to the USB-to-SATA bridge
controller INIC-3637EN for configuring the corresponding hardware AES
engine.

For verifying the entered passcode, the firmware of the INIC-3637EN
reads and decrypts the special sector on the SSD with the provided KEK,
and checks specific data offsets for the known byte pattern (signature)
"0x20 0x49 0x4E 0x49" which represents the string " INI".

If this byte pattern could successfully be found, the entered passcode
and its derived AES key is very likely correct, and enables the firmware
access to the decrypted DEK, which can then be used to decrypt the
actual SSD user data.

This described design of the Verbatim Store 'n' Go Secure Portable HDD
allows for offline brute-force attacks for finding the correct passcode.
Because an attacker can generate and observe the derived AES keys (KEK)
of the keypad for all possible passcodes, and then try to correctly
decrypt the data of specific SSD sector. If the magic byte pattern
" INI" can be found in the expected places of the resulting plaintext,
the correct passcode was found, which then allows for gaining
unauthorized access to the encrypted user data.



Proof of Concept (PoC):

For demonstrating the offline brute-force attack, Matthias Deeg
developed a sample brute-forcing software tool which checks the complete
search space of all possible passcodes between 5 and 12 digits.



Solution:

SySS GmbH is not aware of a solution for the described security issue.



Disclosure Timeline:

2022-01-31: Vulnerability reported to manufacturer
2022-02-11: Vulnerability reported to manufacturer again
2022-03-07: Vulnerability reported to manufacturer again
2022-06-08: Public release of security advisory



References:

[1] Product website fo

[FD] [SYSS-2022-011]: Verbatim Executive Fingerprint Secure SSD - Missing Immutable Root of Trust in Hardware (CWE-1326) (CVE-2022-28383)

2022-06-11 Thread Matthias Deeg

Advisory ID:   SYSS-2022-011
Product:   Executive Fingerprint Secure SSD
Manufacturer:  Verbatim
Affected Version(s):   GDMSFE01-INI3637-C VER1.1
Tested Version(s): GDMSFE01-INI3637-C VER1.1
Vulnerability Type:Missing Immutable Root of Trust in Hardware 
(CWE-1326)

Risk Level:Medium
Solution Status:   Open
Manufacturer Notification: 2022-02-03
Solution Date: -
Public Disclosure: 2022-06-08
CVE Reference: CVE-2022-28383
Author of Advisory:Matthias Deeg (SySS GmbH)



Overview:

The Verbatim Executive Fingerprint Secure SSD is a USB drive with AES
256-bit hardware encryption and a built-in fingerprint sensor for
unlocking the device with previously registered fingerprints.

The manufacturer describes the product as follows:

"The AES 256-bit Hardware Encryption seamlessly encrypts all data on the
drive in real-time. The drive is compliant with GDPR requirements as
100% of the drive is securely encrypted. The built-in fingerprint
recognition system allows access for up to eight authorised users and
one administrator who can access the device via a password. The SSD
does not store passwords in the computer or system's volatile memory
making it far more secure than software encryption."[1]

Due to insufficient firmware validation, an attacker can store
malicious firmware code for the USB-to-SATA bridge controller on the USB
drive which gets executed.



Vulnerability Details:

When analyzing the Verbatim Executive Fingerprint Secure SSD, Matthias
Deeg found out that the validation of the firmware for the USB-to-SATA
bridge controller INIC-3637EN only consists of a simple CRC-16 check
(XMODEM CRC-16).

Thus, an attacker is able to store malicious firmware code for the
INIC-3637EN with a correct checksum on the used SPI flash memory chip
(XT25F01D), which then gets successfully executed by the USB-to-SATA
bridge controller.

For instance, this security vulnerability could be exploited in a
so-called "supply chain attack" when the device is still on its way to
its legitimate user.

An attacker with temporary physical access during the supply could
program a modified firmware on the Verbatim Executive Fingerprint Secure
SSD, which always uses an attacker-controlled AES key for the data
encryption, for example.

If, later on, the attacker gains access to the used USB drive, he can
simply decrypt all contained user data.



Proof of Concept (PoC):

SySS was able to read and write the SPI flash memory containing the
firmware of the INIC-3637EN controller (128 KB) using a universal
programmer.

By analyzing the dumped memory content, SySS found out that the
INIC-3637EN firmware is stored from the file offset 0x4000 to the file
offset 0x1BFFB, and that the corresponding XMODEM CRC-16 is stored at
the file offset 0x1FFFC.

Matthias Deeg developed a simple Python tool for updating the checksum
of modified firmware images before writing them to the SPI flash memory
chip.

The following output exemplarily shows updating a modified firmware
image:

$ python update-firmaware.py firmware_hacked.bin
Verbatim Executive Fingerprint Secure SSD Firmware Updater v0.1 - 
Matthias Deeg, SySS GmbH (c) 2022

[*] Computed CRC-16 (0x7087) does not match stored CRC-16 (0x48EE).
[*] Successfully updated firmware file



Solution:

SySS GmbH is not aware of a solution for the described security issue.



Disclosure Timeline:

2022-02-03: Vulnerability reported to manufacturer
2022-02-11: Vulnerability reported to manufacturer again
2022-03-07: Vulnerability reported to manufacturer again
2022-06-08: Public release of security advisory



References:

[1] Product website for Verbatim Executive Fingerprint Secure SSD

https://www.verbatim-europe.co.uk/en/prod/executive-fingerprint-secure-ssd-usb-32-gen-1--usb-c-1tb-53657/
[2] SySS Security Advisory SYSS-2022-011

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-011.txt
[3] SySS GmbH, SySS Responsible Disclosure Policy
https://www.syss.de/en/responsible-disclosure-policy



Credits:

This security vulnerability was found by Matthias Deeg of SySS GmbH.

E-Mail: matthias.deeg (at) syss.de
Public Key: 
https://www.syss.de/fileadmin/dokumente/Materialien/PGPKeys/Matthias_Deeg.asc

Key fingerprint = D1F0 A035 F06C E675 CDB9 0514 D9A4 BF6A 34AD 4DAB



Disclaim

[FD] [SYSS-2022-015]: Verbatim Fingerprint Secure Portable Hard Drive - Use of a Cryptographic Primitive with a Risky Implementation (CWE-1240) (CVE-2022-28382)

2022-06-11 Thread Matthias Deeg

Advisory ID:   SYSS-2022-015
Product:   Fingerprint Secure Portable Hard Drive
Manufacturer:  Verbatim
Affected Version(s):   #53650
Tested Version(s): #53650
Vulnerability Type:Use of a Cryptographic Primitive with a Risky
   Implementation (CWE-1240)
Risk Level:Low
Solution Status:   Open
Manufacturer Notification: 2022-02-03
Solution Date: -
Public Disclosure: 2022-06-08
CVE Reference: CVE-2022-28382
Author of Advisory:Matthias Deeg (SySS GmbH)



Overview:

The Verbatim Fingerprint Secure Portable Hard Drive is a USB drive with
AES 256-bit hardware encryption and a built-in fingerprint sensor for
unlocking the device with previously registered fingerprints.

The manufacturer describes the product as follows:

"The AES 256-bit Hardware Encryption seamlessly encrypts all data on the
drive in real-time. The drive is compliant with GDPR requirements as
100% of the drive is securely encrypted. The built-in fingerprint
recognition system allows access for up to eight authorised users and
one administrator who can access the device via a password. The hard
drive does not store passwords in the computer or system's volatile
memory making it far more secure than software encryption."[1]

Due to the use of an insecure encryption AES mode (Electronic Codebook),
an attacker may be able to extract information even from
encrypted data, for example by observing repeating byte patterns.



Vulnerability Details:

When analyzing the Verbatim Fingerprint Secure Portable Hard Drive,
Matthias Deeg found out that the firmware of the USB-to-SATA bridge
controller INIC-3637EN uses AES-256 with the ECB (Electronic Codebook)
mode.

This operation mode of block ciphers like AES encrypts identical
plaintext data, in this case blocks of 16 bytes, always to identical
ciphertext data.

For some data, for instance bitmap images, the lack of the cryptographic
property called diffusion concerning the ECB mode can leak sensitive
information even in encrypted data.

One famous example for this is an ECB-encrypted image of the TUX
penguin, which, for instance, is referenced in the Wikipedia article
about block cipher modes of operation[2] to illustrate this issue.

Thus, the use of the ECB operation mode can put the confidentiality of
specific information at risk, even in an encrypted form.

Additionally, in attack scenarios where an attacker has short-time
physical access to a Verbatim Fingerprint Secure Portable Hard Drive,
and later returns it to its legitimate owner, the attacker may be able
to compromise the integrity of the stored data by exploiting the fact
that the same 16-byte plaintext blocks result in the same 16-byte
ciphertext blocks, by replacing specific encrypted 16-byte blocks with
other ones.



Proof of Concept (PoC):

The same 16 byte long plaintext pattern was written several times to an
unlocked Verbatim Fingerprint Secure Portable Hard Drive.

When the hard drive was then read using another drive enclosure, the
same 16 byte long ciphertext pattern could be observed for the
corresponding plaintext data.



Solution:

SySS GmbH is not aware of a solution for the described security issue.



Disclosure Timeline:

2022-02-03: Vulnerability reported to manufacturer
2022-02-11: Vulnerability reported to manufacturer again
2022-03-07: Vulnerability reported to manufacturer again
2022-06-08: Public release of security advisory



References:

[1] Product website for Verbatim Fingerprint Secure Portable Hard Drive

https://www.verbatim-europe.co.uk/en/prod/fingerprint-secure-portable-hard-drive-1tb-53650/
[2] Wikipedia article about block cipher mode of operation

https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation#Electronic_codebook_(ECB)
[3] SySS Security Advisory SYSS-2022-015

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-015.txt
[4] SySS GmbH, SySS Responsible Disclosure Policy
https://www.syss.de/en/responsible-disclosure-policy



Credits:

This security vulnerability was found by Matthias Deeg of SySS GmbH.

E-Mail: matthias.deeg (at) syss.de
Public Key: 
https://www.syss.de/fileadmin/dokumente/Materialien/PGPKeys/Matthias_Deeg.asc

Key fingerprint = D1F0 A035 F06C E675 CDB9 0514 D9A4 BF6A 34AD 4DAB



Disclaimer:

The information provided in thi

[FD] [SYSS-2022-017]: Verbatim Fingerprint Secure Portable Hard Drive - Insufficient Verification of Data Authenticity (CWE-345) (CVE-2022-28385)

2022-06-11 Thread Matthias Deeg

Advisory ID:   SYSS-2022-017
Product:   Fingerprint Secure Portable Hard Drive
Manufacturer:  Verbatim
Affected Version(s):   #53650
Tested Version(s): #53650
Vulnerability Type:Insufficient Verification of Data 
Authenticity (CWE-345)

Risk Level:Low
Solution Status:   Open
Manufacturer Notification: 2022-02-03
Solution Date: -
Public Disclosure: 2022-06-08
CVE Reference: CVE-2022-28385
Author of Advisory:Matthias Deeg (SySS GmbH)



Overview:

The Verbatim Fingerprint Secure Portable Hard Drive is a USB drive with
AES 256-bit hardware encryption and a built-in fingerprint sensor for
unlocking the device with previously registered fingerprints.

The manufacturer describes the product as follows:

"The AES 256-bit Hardware Encryption seamlessly encrypts all data on the
drive in real-time. The drive is compliant with GDPR requirements as
100% of the drive is securely encrypted. The built-in fingerprint
recognition system allows access for up to eight authorised users and
one administrator who can access the device via a password. The hard
drive does not store passwords in the computer or system's volatile
memory making it far more secure than software encryption."[1]

Due to missing integrity checks, an attacker can manipulate the content
of the emulated CD-ROM drive containing the Windows and macOS client
software.



Vulnerability Details:

When analyzing the Verbatim Fingerprint Secure Portable Hard Drive,
Matthias Deeg found out that the content of the emulated CD-ROM drive
containing the Windows and macOS client software can be manipulated.

The content of this emulated CD-ROM drive is stored as ISO-9660 image
in the "hidden" sectors of the USB drive that can only be accessed
using special IOCTL commands, or when installing the drive in an
external disk enclosure.

The following output exemplarily shows the content of the ISO-9660
file system:


# mount hidden_sectors.bin /mnt/

# lsd -laR /mnt/
dr-xr-xr-x root root 2.0 KB Wed Aug 14 10:28:51 2019  .
drwxr-xr-x root root 4.0 KB Fri Jan  7 16:39:47 2022  ..
.r-xr-xr-x root root  70 B  Wed Aug 14 09:20:40 2019  Autorun.inf
dr-xr-xr-x root root 2.0 KB Wed Aug 14 10:28:51 2019  MAC
dr-xr-xr-x root root 2.0 KB Wed Aug 14 10:28:51 2019  Windows

/mnt/MAC:
dr-xr-xr-x root root 2.0 KB Wed Aug 14 10:28:51 2019  .
dr-xr-xr-x root root 2.0 KB Wed Aug 14 10:28:51 2019  ..
.r-xr-xr-x root root  13 KB Fri Aug  9 09:03:24 2019  setup
dr-xr-xr-x root root 2.0 KB Wed Aug 14 10:28:51 2019  Source

/mnt/MAC/Source:
dr-xr-xr-x root root 2.0 KB Wed Aug 14 10:28:51 2019  .
dr-xr-xr-x root root 2.0 KB Wed Aug 14 10:28:51 2019  ..
.r-xr-xr-x root root 5.9 MB Mon Jul 22 06:22:24 2019  gtk_dylib.tar
.r-xr-xr-x root root 1.0 MB Wed Aug 14 06:25:10 2019  VERBATIM_B0_V1.1.tar

/mnt/Windows:
dr-xr-xr-x root root 2.0 KB Wed Aug 14 10:28:51 2019  .
dr-xr-xr-x root root 2.0 KB Wed Aug 14 10:28:51 2019  ..
.r-xr-xr-x root root 5.6 KB Fri Aug  9 10:47:26 2019  English.txt
.r-xr-xr-x root root 6.6 KB Fri Aug  9 10:47:26 2019  French.txt
.r-xr-xr-x root root 6.2 KB Fri Aug  9 10:47:26 2019  German.txt
dr-xr-xr-x root root 2.0 KB Wed Aug 14 10:28:51 2019  Ico
.r-xr-xr-x root root 6.2 KB Fri Aug  9 10:47:26 2019  Italian.txt
.r-xr-xr-x root root 512 B  Fri Aug  9 10:47:26 2019  license.bin
.r-xr-xr-x root root 160 KB Fri Aug  9 10:47:26 2019  odbccp32.dll
.r-xr-xr-x root root 7.1 KB Fri Aug  9 10:47:26 2019  Spanish.txt
.r-xr-xr-x root root 4.9 MB Wed Aug 14 09:12:49 2019  VerbatimSecure.exe

/mnt/Windows/Ico:
dr-xr-xr-x root root 2.0 KB Wed Aug 14 10:28:51 2019  .
dr-xr-xr-x root root 2.0 KB Wed Aug 14 10:28:51 2019  ..
.r-xr-xr-x root root  34 KB Fri Aug  9 10:47:26 2019  Verbatim.ico

By manipulating this ISO-9660 image or replacing it with another one, an
attacker is able to store malicious software on the emulated CD-ROM
drive which then may get executed by an unsuspecting victim when using
the device.

For example, an attacker with temporary physical access during the
supply could program a modified ISO-9660 image on the Verbatim
Fingerprint Secure Portable Hard Drive, which always uses an attacker-
controlled password for unlocking the device.

If, later on, the attacker gains access to the used USB drive, he can
simply decrypt all contained user data.

Storing other arbitrary, malicious software is also possible.



Proof of Concept (PoC):

SySS could successfully modify the content of the ISO-9660 image
containing the Windows and macOS software for unlocking and managing the
Verbatim Fingerprint Secure Portalbe Hard Drive.




[FD] [SYSS-2022-002]: Verbatim Keypad Secure USB 3.2 Gen 1 Drive - Use of a Cryptographic Primitive with a Risky Implementation (CWE-1240) (CVE-2022-28382)

2022-06-11 Thread Matthias Deeg

Advisory ID:   SYSS-2022-002
Product:   Keypad Secure USB 3.2 Gen 1 Drive
Manufacturer:  Verbatim
Affected Version(s):   Part Number #49428
Tested Version(s): Part Number #49428
Vulnerability Type:Use of a Cryptographic Primitive with a Risky
   Implementation (CWE-1240)
Risk Level:Low
Solution Status:   Open
Manufacturer Notification: 2022-01-27
Solution Date: -
Public Disclosure: 2022-06-08
CVE Reference: CVE-2022-28382
Author of Advisory:Matthias Deeg (SySS GmbH)



Overview:

The Verbatim Keypad Secure is a USB drive with AES 256-bit hardware
encryption and a built-in keypad for passcode entry.

The manufacturer describes the product as follows:

"The AES 256-bit Hardware Encryption seamlessly encrypts all data on the
drive in real-time with a built-in keypad for passcode input. The USB
Drive does not store passwords in the computer or system's volatile
memory making it far more secure than software encryption. Also, if it
falls into the wrong hands, the device will lock and require
re-formatting after 20 failed passcode attempts."[1]

Due to the use of an insecure encryption AES mode (Electronic Codebook),
an attacker may be able to extract information even from
encrypted data, for example by observing repeating byte patterns.



Vulnerability Details:

When analyzing the USB drive Verbatim Keypad Secure, Matthias Deeg found
out that the firmware of the USB-to-SATA bridge controller INIC-3637EN
uses AES-256 with the ECB (Electronic Codebook) mode.

This operation mode of block ciphers like AES encrypts identical
plaintext data, in this case blocks of 16 bytes, always to identical
ciphertext data.

For some data, for instance bitmap images, the lack of the cryptographic
property called diffusion concerning the ECB mode can leak sensitive
information even in encrypted data.

One famous example for this is an ECB-encrypted image of the TUX
penguin, which, for instance, is referenced in the Wikipedia article
about block cipher modes of operation[2] to illustrate this issue.

Thus, the use of the ECB operation mode can put the confidentiality of
specific information at risk, even in an encrypted form.

Additionally, in attack scenarios where an attacker has short-time
physical access to a Verbatim Keypad Secure USB drive, and later returns
it to its legitimate owner, the attacker may be able to compromise the
integrity of the stored data by exploiting the fact that the same
16-byte plaintext blocks result in the same 16-byte ciphertext blocks,
by replacing specific encrypted 16-byte blocks with other ones.



Proof of Concept (PoC):

The same 16 byte long plaintext pattern was written several times to an
unlocked Verbatim Keypad Secure USB drive.

When the SSD was then read using another SSD enclosure, the same 16
byte long ciphertext pattern could be observed for the corresponding
plaintext data.



Solution:

SySS GmbH is not aware of a solution for the described security issue.



Disclosure Timeline:

2022-01-27: Vulnerability reported to manufacturer
2022-02-11: Vulnerability reported to manufacturer again
2022-03-07: Vulnerability reported to manufacturer again
2022-06-08: Public release of security advisory



References:

[1] Product website for Verbatim Keypad Secure

https://www.verbatim-europe.co.uk/en/prod/verbatim-keypad-secure-usb-32-gen-1-drive-64gb-49428/#
[2] Wikipedia article about block cipher mode of operation

https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation#Electronic_codebook_(ECB)
[3] SySS Security Advisory SYSS-2022-002

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-002.txt
[4] SySS GmbH, SySS Responsible Disclosure Policy
https://www.syss.de/en/responsible-disclosure-policy



Credits:

This security vulnerability was found by Matthias Deeg of SySS GmbH.

E-Mail: matthias.deeg (at) syss.de
Public Key: 
https://www.syss.de/fileadmin/dokumente/Materialien/PGPKeys/Matthias_Deeg.asc

Key fingerprint = D1F0 A035 F06C E675 CDB9 0514 D9A4 BF6A 34AD 4DAB



Disclaimer:

The information provided in this security advisory is provided "as is"
and without warranty of any kind. Details of this security advisory may
be updated in order to provide as accurate information as possible. The
latest version of th

[FD] [SYSS-2022-003]: Verbatim Keypad Secure USB 3.2 Gen 1 Drive - Missing Immutable Root of Trust in Hardware (CWE-1326) (CVE-2022-28383)

2022-06-11 Thread Matthias Deeg

Advisory ID:   SYSS-2022-003
Product:   Keypad Secure USB 3.2 Gen 1 Drive
Manufacturer:  Verbatim
Affected Version(s):   Part Number #49428
Tested Version(s): Part Number #49428
Vulnerability Type:Missing Immutable Root of Trust in Hardware 
(CWE-1326)

Risk Level:Medium
Solution Status:   Open
Manufacturer Notification: 2022-01-27
Solution Date: -
Public Disclosure: 2022-06-08
CVE Reference: CVE-2022-28383
Author of Advisory:Matthias Deeg (SySS GmbH)



Overview:

The Verbatim Keypad Secure is a USB drive with AES 256-bit hardware
encryption and a built-in keypad for passcode entry.

The manufacturer describes the product as follows:

"The AES 256-bit Hardware Encryption seamlessly encrypts all data on the
drive in real-time with a built-in keypad for passcode input. The USB
Drive does not store passwords in the computer or system's volatile
memory making it far more secure than software encryption. Also, if it
falls into the wrong hands, the device will lock and require
re-formatting after 20 failed passcode attempts."[1]

Due to insufficient firmware validation, an attacker can store
malicious firmware code for the USB-to-SATA bridge controller on the USB
drive which gets executed.



Vulnerability Details:

When analyzing the USB drive Verbatim Keypad Secure, Matthias Deeg found
out that the validation of the firmware for the USB-to-SATA bridge
controller INIC-3637EN only consists of a simple CRC-16 check (XMODEM
CRC-16).

Thus, an attacker is able to store malicious firmware code for the
INIC-3637EN with a correct checksum on the used SPI flash memory chip
(XT25F01D), which then gets successfully executed by the USB-to-SATA
bridge controller.

For instance, this security vulnerability could be exploited in a
so-called "supply chain attack" when the device is still on its way to
its legitimate user.

An attacker with temporary physical access during the supply could
program a modified firmware on the Verbatim Keypad Secure, which always
uses an attacker-controlled AES key for the data encryption, for
example.

If, later on, the attacker gains access to the used USB drive, he
can simply decrypt all contained user data.



Proof of Concept (PoC):

SySS was able to read and write the SPI flash memory containing the
firmware of the INIC-3637EN controller (128 KB) using a universal
programmer.

By analyzing the dumped memory content, SySS found out that the
INIC-3637EN firmware is stored from the file offset 0x4000 to the file
offset 0x1BFFB, and that the corresponding XMODEM CRC-16 is stored at
the file offset 0x1FFFC.

Matthias Deeg developed a simple Python tool for updating the checksum
of modified firmware images before writing them to the SPI flash memory
chip.

The following output exemplarily shows updating a modified firmware
image:

$ python update-firmaware.py firmware_hacked.bin
Verbatim Secure Keypad Firmware Updater v0.1 - Matthias Deeg, SySS GmbH 
(c) 2022

[*] Computed CRC-16 (0x03F5) does not match stored CRC-16 (0x8B17).
[*] Successfully updated firmware file



Solution:

SySS GmbH is not aware of a solution for the described security issue.



Disclosure Timeline:

2022-01-27: Vulnerability reported to manufacturer
2022-02-11: Vulnerability reported to manufacturer again
2022-03-07: Vulnerability reported to manufacturer again
2022-06-08: Public release of security advisory



References:

[1] Product website for Verbatim Keypad Secure

https://www.verbatim-europe.co.uk/en/prod/verbatim-keypad-secure-usb-32-gen-1-drive-64gb-49428/#
[2] GitHub repository of flashrom
https://github.com/flashrom/flashrom
[3] SySS Security Advisory SYSS-2022-003

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-003.txt
[4] SySS GmbH, SySS Responsible Disclosure Policy
https://www.syss.de/en/responsible-disclosure-policy



Credits:

This security vulnerability was found by Matthias Deeg of SySS GmbH.

E-Mail: matthias.deeg (at) syss.de
Public Key: 
https://www.syss.de/fileadmin/dokumente/Materialien/PGPKeys/Matthias_Deeg.asc

Key fingerprint = D1F0 A035 F06C E675 CDB9 0514 D9A4 BF6A 34AD 4DAB



Disclaimer:

The information provided in this security advisory is provided "as is"
and without warranty of any kind. Details of this security advisory may

[FD] [SYSS-2022-006]: Verbatim Store 'n' Go Secure Portable HDD - Use of a Cryptographic Primitive with a Risky Implementation (CWE-1240) (CVE-2022-28382)

2022-06-11 Thread Matthias Deeg

Advisory ID:   SYSS-2022-006
Product:   Store 'n' Go Secure Portable HDD
Manufacturer:  Verbatim
Affected Version(s):   GD25LK01-3637-C VER4.0
Tested Version(s): GD25LK01-3637-C VER4.0
Vulnerability Type:Use of a Cryptographic Primitive with a Risky
   Implementation (CWE-1240)
Risk Level:Low
Solution Status:   Open
Manufacturer Notification: 2022-01-31
Solution Date: -
Public Disclosure: 2022-06-08
CVE Reference: CVE-2022-28382
Author of Advisory:Matthias Deeg (SySS GmbH)



Overview:

The Verbatim Store 'n' Go Secure Portable HDD is a portable USB drive
with AES 256-bit hardware encryption and a built-in keypad for passcode
entry.

The manufacturer describes the product as follows:

"The AES 256-bit Hardware Encryption seamlessly encrypts all data on the
drive in real-time with a built-in keypad for password input. The SSD
does not store passwords in the computer or system's volatile memory
making it far more secure than software encryption. Also, if it falls
into the wrong hands, the SSD will lock and require re-formatting after
20 failed password attempts."[1]

Due to the use of an insecure encryption AES mode (Electronic Codebook),
an attacker may be able to extract information even from
encrypted data, for example by observing repeating byte patterns.



Vulnerability Details:

When analyzing the external SSD Verbatim Store 'n' Go Secure Portable
HDD, Matthias Deeg found out that the firmware of the USB-to-SATA bridge
controller INIC-3637EN uses AES-256 with the ECB (Electronic Codebook)
mode.

This operation mode of block ciphers like AES encrypts identical
plaintext data, in this case blocks of 16 bytes, always to identical
ciphertext data.

For some data, for instance bitmap images, the lack of the cryptographic
property called diffusion concerning the ECB mode can leak sensitive
information even in encrypted data.

One famous example for this is an ECB-encrypted image of the TUX
penguin, which, for instance, is referenced in the Wikipedia article
about block cipher modes of operation[2] to illustrate this issue.

Thus, the use of the ECB operation mode can put the confidentiality of
specific information at risk, even in an encrypted form.

Additionally, in attack scenarios where an attacker has short-time
physical access to a Verbatim Store 'n' Go Portable Secure HDD, and
later returns it to its legitimate owner, the attacker may be able to
compromise the integrity of the stored data by exploiting the fact that
the same 16-byte plaintext blocks result in the same 16-byte ciphertext
blocks, by replacing specific encrypted 16-byte blocks with other ones.



Proof of Concept (PoC):

The same 16 byte long plaintext pattern was written several times to an
unlocked Verbatim Store 'n' Go Secure Portable HDD.

When the SSD was then read using another SSD enclosure, the same 16
byte long ciphertext pattern could be observed for the corresponding
plaintext data.



Solution:

SySS GmbH is not aware of a solution for the described security issue.



Disclosure Timeline:

2022-01-31: Vulnerability reported to manufacturer
2022-02-11: Vulnerability reported to manufacturer again
2022-03-07: Vulnerability reported to manufacturer again
2022-06-08: Public release of security advisory



References:

[1] Product website for Verbatim Store 'n' Go Secure Portable HDD

https://www.verbatim-europe.co.uk/en/prod/store-n-go-portable-ssd-with-keypad-access-256gb-53402/
[2] Wikipedia article about block cipher mode of operation

https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation#Electronic_codebook_(ECB)
[3] SySS Security Advisory SYSS-2022-006

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-006.txt
[4] SySS GmbH, SySS Responsible Disclosure Policy
https://www.syss.de/en/responsible-disclosure-policy



Credits:

This security vulnerability was found by Matthias Deeg of SySS GmbH.

E-Mail: matthias.deeg (at) syss.de
Public Key: 
https://www.syss.de/fileadmin/dokumente/Materialien/PGPKeys/Matthias_Deeg.asc

Key fingerprint = D1F0 A035 F06C E675 CDB9 0514 D9A4 BF6A 34AD 4DAB



Disclaimer:

The information provided in this security advisory is provided "as is"
and without warranty of any kind. Details of this security advisory may
be updated

[FD] [SYSS-2022-007]: Verbatim Store 'n' Go Secure Portable HDD - Missing Immutable Root of Trust in Hardware (CWE-1326) (CVE-2022-28383)

2022-06-11 Thread Matthias Deeg

Advisory ID:   SYSS-2022-007
Product:   Store 'n' Go Secure Portable HDD
Manufacturer:  Verbatim
Affected Version(s):   GD25LK01-3637-C VER4.0
Tested Version(s): GD25LK01-3637-C VER4.0
Vulnerability Type:Missing Immutable Root of Trust in Hardware 
(CWE-1326)

Risk Level:Medium
Solution Status:   Open
Manufacturer Notification: 2022-01-31
Solution Date: -
Public Disclosure: 2022-06-08
CVE Reference: CVE-2022-28383
Author of Advisory:Matthias Deeg (SySS GmbH)



Overview:

The Verbatim Store 'n' Go Secure Portable HDD is a portable USB drive
with AES 256-bit hardware encryption and a built-in keypad for passcode
entry.

The manufacturer describes the product as follows:

"The AES 256-bit Hardware Encryption seamlessly encrypts all data on the
drive in real-time with a built-in keypad for password input. The SSD
does not store passwords in the computer or system's volatile memory
making it far more secure than software encryption. Also, if it falls
into the wrong hands, the SSD will lock and require re-formatting after
20 failed password attempts."[1]

Due to insufficient firmware validation, an attacker can store
malicious firmware code for the USB-to-SATA bridge controller on the
external drive which gets executed.



Vulnerability Details:

When analyzing the external SSD Verbatim Store 'n' Go Secure Portable
HDD, Matthias Deeg found out that the validation of the firmware for the
USB-to-SATA bridge controller INIC-3637EN only consists of a simple
CRC-16 check (XMODEM CRC-16).

Thus, an attacker is able to store malicious firmware code for the
INIC-3637EN with a correct checksum on the used SPI flash memory chip
(XT25F01D), which then gets successfully executed by the USB-to-SATA
bridge controller.

For instance, this security vulnerability could be exploited in a
so-called "supply chain attack" when the device is still on its way to
its legitimate user.

An attacker with temporary physical access during the supply could
program a modified firmware on the Verbatim Keypad Secure, which always
uses an attacker-controlled AES key for the data encryption, for
example.

If, later on, the attacker gains access to the used USB drive, he
can simply decrypt all contained user data.



Proof of Concept (PoC):

SySS was able to read and write the SPI flash memory containing the
firmware of the INIC-3637EN controller (128 KB) using a universal
programmer.

By analyzing the dumped memory content, SySS found out that the
INIC-3637EN firmware is stored from the file offset 0x4000 to the file
offset 0x1BFFB, and that the corresponding XMODEM CRC-16 is stored at
the file offset 0x1FFFC.

Matthias Deeg developed a simple Python tool for updating the checksum
of modified firmware images before writing them to the SPI flash memory
chip.

The following output exemplarily shows updating a modified firmware
image:

$ python update-firmaware.py firmware_hacked.bin
Verbatim Store 'n' Go Firmware Updater v0.1 - Matthias Deeg, SySS GmbH 
(c) 2022

[*] Computed CRC-16 (0x03F5) does not match stored CRC-16 (0x8B17).
[*] Successfully updated firmware file



Solution:

SySS GmbH is not aware of a solution for the described security issue.



Disclosure Timeline:

2022-01-31: Vulnerability reported to manufacturer
2022-02-11: Vulnerability reported to manufacturer again
2022-03-07: Vulnerability reported to manufacturer again
2022-06-08: Public release of security advisory



References:

[1] Product website for Verbatim Store 'n' Go Secure Portable HDD

https://www.verbatim-europe.co.uk/en/prod/store-n-go-portable-ssd-with-keypad-access-256gb-53402/
[2] SySS Security Advisory SYSS-2022-007

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-007.txt
[3] SySS GmbH, SySS Responsible Disclosure Policy
https://www.syss.de/en/responsible-disclosure-policy



Credits:

This security vulnerability was found by Matthias Deeg of SySS GmbH.

E-Mail: matthias.deeg (at) syss.de
Public Key: 
https://www.syss.de/fileadmin/dokumente/Materialien/PGPKeys/Matthias_Deeg.asc

Key fingerprint = D1F0 A035 F06C E675 CDB9 0514 D9A4 BF6A 34AD 4DAB



Disclaimer:

The information provided in this security advisory is provided "as is"
and without warranty of any kind. Details of this security advisory may

[FD] [SYSS-2022-009]: Verbatim Executive Fingerprint Secure SSD - Use of a Cryptographic Primitive with a Risky Implementation (CWE-1240) (CVE-2022-28387)

2022-06-11 Thread Matthias Deeg

Advisory ID:   SYSS-2022-009
Product:   Executive Fingerprint Secure SSD
Manufacturer:  Verbatim
Affected Version(s):   GDMSFE01-INI3637-C VER1.1
Tested Version(s): GDMSFE01-INI3637-C VER1.1
Vulnerability Type:Use of a Cryptographic Primitive with a Risky
   Implementation (CWE-1240)
Risk Level:High
Solution Status:   Open
Manufacturer Notification: 2022-02-03
Solution Date: -
Public Disclosure: 2022-06-08
CVE Reference: CVE-2022-28387
Author of Advisory:Matthias Deeg (SySS GmbH)



Overview:

The Verbatim Executive Fingerprint Secure SSD is a USB drive with AES
256-bit hardware encryption and a built-in fingerprint sensor for
unlocking the device with previously registered fingerprints.

The manufacturer describes the product as follows:

"The AES 256-bit Hardware Encryption seamlessly encrypts all data on the
drive in real-time. The drive is compliant with GDPR requirements as
100% of the drive is securely encrypted. The built-in fingerprint
recognition system allows access for up to eight authorised users and
one administrator who can access the device via a password. The SSD
does not store passwords in the computer or system's volatile memory
making it far more secure than software encryption."[1]

Due to an insecure design, the Verbatim Executive Fingerprint Secure SSD
can be unlocked by an attacker who can thus gain unauthorized access to
the stored data.



Vulnerability Details:

When analyzing the Verbatim Executive Fingerprint Secure SSD, Matthias
Deeg found out it uses an insecure design which allows retrieving the
currently used password and thus the ability to unlock and access the
stored data in an unauthorized way.

The Verbatim Executive Fingerprint Secure SSD consists of the following
five main parts:

1. An SSD in M.2 form factor
2. A USB-to-SATA bridge controller (INIC-3637EN)
3. An SPI flash memory chip (XT25F01D) containing the firmware of the
   INIC-3637EN
4. A fingerprint sensor
5. A fingerprint sensor controller (INIC-3782N)

For encrypting the data stored on the SSD, the hardware AES engine of
the INIC-3637EN is used. More specifically, AES-256 in ECB (Electronic
Codebook) mode is used for data encryption, which is also a security
issue by itself, as described in the SySS security advisory
SYSS-2022-010[2].

The SSD can be either unlocked via the fingerprint sensor using a
previously registered fingerprint or via a password.

Unlocking the SSD via a password takes place using a Windows or macOS
client software that sends specific IOCTL commands
(IOCTL_SCSI_PASS_THROUGH) to the USB device.

The data part of those device-specific commands is encrypted using AES
with a hard-coded cryptographic key found within the client software
and the USB-to-SATA bridge controller's firmware.

One of the supported commands is able to retrieve the currently set
password and cryptographic key material used for the data disk
encryption.

By sending this specific IOCTL command to the USB device and knowing the
used AES encryption scheme for the command data, an attacker can
instantly retrieve the correct password and thus unlock the device in
order to gain unauthorized access to its stored data.



Proof of Concept (PoC):

For demonstrating the described security vulnerability, Matthias Deeg
developed a software tool that can extract the currently set password
of a Verbatim Executive Fingerprint Secure SSD. This enables an attacker
to instantly unlock the device.



Solution:

SySS GmbH is not aware of a solution for the described security issue.



Disclosure Timeline:

2022-02-03: Vulnerability reported to manufacturer
2022-02-11: Vulnerability reported to manufacturer again
2022-03-07: Vulnerability reported to manufacturer again
2022-06-08: Public release of security advisory



References:

[1] Product website for Verbatim Executive Fingerprint Secure SSD

https://www.verbatim-europe.co.uk/en/prod/executive-fingerprint-secure-ssd-usb-32-gen-1--usb-c-1tb-53657/
[2] SySS Security Advisory SYSS-2022-010

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-010.txt
[3] SySS Security Advisory SYSS-2022-009

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-009.txt
[4] SySS GmbH, SySS Responsible Disclosure Policy
https://www.syss.de/en/responsible-disclosure-policy



Credits:

This security vul

[FD] [SYSS-2022-014]: Verbatim Fingerprint Secure Portable Hard Drive - Use of a Cryptographic Primitive with a Risky Implementation (CWE-1240) (CVE-2022-28387)

2022-06-11 Thread Matthias Deeg

Advisory ID:   SYSS-2022-014
Product:   Fingerprint Secure Portable Hard Drive
Manufacturer:  Verbatim
Affected Version(s):   #53650
Tested Version(s): #53650
Vulnerability Type:Use of a Cryptographic Primitive with a Risky
   Implementation (CWE-1240)
Risk Level:High
Solution Status:   Open
Manufacturer Notification: 2022-02-03
Solution Date: -
Public Disclosure: 2022-06-08
CVE Reference: CVE-2022-28387
Author of Advisory:Matthias Deeg (SySS GmbH)



Overview:

The Verbatim Fingerprint Secure Portable Hard Drive is a USB drive with
AES 256-bit hardware encryption and a built-in fingerprint sensor for
unlocking the device with previously registered fingerprints.

The manufacturer describes the product as follows:

"The AES 256-bit Hardware Encryption seamlessly encrypts all data on the
drive in real-time. The drive is compliant with GDPR requirements as
100% of the drive is securely encrypted. The built-in fingerprint
recognition system allows access for up to eight authorised users and
one administrator who can access the device via a password. The hard
drive does not store passwords in the computer or system's volatile
memory making it far more secure than software encryption."[1]

Due to an insecure design, the Verbatim Fingerprint Secure Portable Hard
Drive can be unlocked by an attacker who can thus gain unauthorized
access to the stored data.



Vulnerability Details:

When analyzing the Verbatim Fingerprint Secure Portable Hard Drive,
Matthias Deeg found out it uses an insecure design which allows
retrieving the currently used password and thus the ability to unlock
and access the stored data in an unauthorized way.

The Verbatim Fingerprint Secure Portable Hard Drive consists of the
following five main parts:

1. A hard drive (3.5 inch)
2. A USB-to-SATA bridge controller (INIC-3637EN)
3. An SPI flash memory chip (XT25F01B) containing the firmware of the
   INIC-3637EN
4. A fingerprint sensor
5. A fingerprint sensor controller (INIC-3782N)

For encrypting the data stored on the hard drive, the hardware AES
engine of the INIC-3637EN is used. More specifically, AES-256 in ECB
(Electronic Codebook) mode is used for data encryption, which is also a
security issue by itself, as described in the SySS security advisory
SYSS-2022-015[2].

The hard drive can be either unlocked via the fingerprint sensor using a
previously registered fingerprint or via a password.

Unlocking the hard drive via a password takes place using a Windows or
macOS client software that sends specific IOCTL commands
(IOCTL_SCSI_PASS_THROUGH) to the USB device.

The data part of those device-specific commands is encrypted using AES
with a hard-coded cryptographic key found within the client software
and the USB-to-SATA bridge controller's firmware.

One of the supported commands is able to retrieve the currently set
password and cryptographic key material used for the data disk
encryption.

By sending this specific IOCTL command to the USB device and knowing the
used AES encryption scheme for the command data, an attacker can
instantly retrieve the correct password and thus unlock the device in
order to gain unauthorized access to its stored data.



Proof of Concept (PoC):

For demonstrating the described security vulnerability, Matthias Deeg
developed a software tool that can extract the currently set password
of a Verbatim Fingerprint Secure Portable Hard Drive. This enables an
attacker to instantly unlock the device.



Solution:

SySS GmbH is not aware of a solution for the described security issue.



Disclosure Timeline:

2022-02-03: Vulnerability reported to manufacturer
2022-02-11: Vulnerability reported to manufacturer again
2022-03-07: Vulnerability reported to manufacturer again
2022-06-08: Public release of security advisory



References:

[1] Product website for Verbatim Fingerprint Secure Portable Hard Drive

https://www.verbatim-europe.co.uk/en/prod/fingerprint-secure-portable-hard-drive-1tb-53650/
[2] SySS Security Advisory SYSS-2022-015

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-015.txt
[3] SySS Security Advisory SYSS-2022-014

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-014.txt
[4] SySS GmbH, SySS Responsible Disclosure Policy
https://www.syss.de/en/responsible-disclosure-policy



Credits:

Thi

[FD] [SYSS-2022-016]: Verbatim Fingerprint Secure Portable Hard Drive - Missing Immutable Root of Trust in Hardware (CWE-1326) (CVE-2022-28383)

2022-06-11 Thread Matthias Deeg

Advisory ID:   SYSS-2022-016
Product:   Fingerprint Secure Portable Hard Drive
Manufacturer:  Verbatim
Affected Version(s):   #53650
Tested Version(s): #53650
Vulnerability Type:Missing Immutable Root of Trust in Hardware 
(CWE-1326)

Risk Level:Medium
Solution Status:   Open
Manufacturer Notification: 2022-02-03
Solution Date: -
Public Disclosure: 2022-06-08
CVE Reference: CVE-2022-28383
Author of Advisory:Matthias Deeg (SySS GmbH)



Overview:

The Verbatim Fingerprint Secure Portable Hard Drive is a USB drive with
AES 256-bit hardware encryption and a built-in fingerprint sensor for
unlocking the device with previously registered fingerprints.

The manufacturer describes the product as follows:

"The AES 256-bit Hardware Encryption seamlessly encrypts all data on the
drive in real-time. The drive is compliant with GDPR requirements as
100% of the drive is securely encrypted. The built-in fingerprint
recognition system allows access for up to eight authorised users and
one administrator who can access the device via a password. The hard
drive does not store passwords in the computer or system's volatile
memory making it far more secure than software encryption."[1]

Due to insufficient firmware validation, an attacker can store
malicious firmware code for the USB-to-SATA bridge controller on the USB
drive which gets executed.



Vulnerability Details:

When analyzing the Fingerprint Secure Portable Hard Drive, Matthias Deeg
found out that the validation of the firmware for the USB-to-SATA bridge
controller INIC-3637EN only consists of a simple CRC-16 check (XMODEM
CRC-16).

Thus, an attacker is able to store malicious firmware code for the
INIC-3637EN with a correct checksum on the used SPI flash memory chip
(XT25F01B), which then gets successfully executed by the USB-to-SATA
bridge controller.

For instance, this security vulnerability could be exploited in a
so-called "supply chain attack" when the device is still on its way to
its legitimate user.

An attacker with temporary physical access during the supply could
program a modified firmware on the Verbatim Fingerprint Secure Portable
Hard Drive, which always uses an attacker-controlled AES key for the
data encryption, for example.

If, later on, the attacker gains access to the used USB drive, he can
simply decrypt all contained user data.



Proof of Concept (PoC):

SySS was able to read and write the SPI flash memory containing the
firmware of the INIC-3637EN controller (128 KB) using a universal
programmer.

By analyzing the dumped memory content, SySS found out that the
INIC-3637EN firmware is stored from the file offset 0x4000 to the file
offset 0x1BFFB, and that the corresponding XMODEM CRC-16 is stored at
the file offset 0x1FFFC.

Matthias Deeg developed a simple Python tool for updating the checksum
of modified firmware images before writing them to the SPI flash memory
chip.

The following output exemplarily shows updating a modified firmware
image:

$ python update-firmaware.py firmware_hacked.bin
Verbatim Fingerprint Secure Portable Hard Drive Updater v0.1 - Matthias 
Deeg, SySS GmbH (c) 2022

[*] Computed CRC-16 (0x86DD) does not match stored CRC-16 (0x77FF).
[*] Successfully updated firmware file



Solution:

SySS GmbH is not aware of a solution for the described security issue.



Disclosure Timeline:

2022-02-03: Vulnerability reported to manufacturer
2022-02-11: Vulnerability reported to manufacturer again
2022-03-07: Vulnerability reported to manufacturer again
2022-06-08: Public release of security advisory



References:

[1] Product website for Verbatim Fingerprint Secure Portable Hard Drive

https://www.verbatim-europe.co.uk/en/prod/fingerprint-secure-portable-hard-drive-1tb-53650/
[2] SySS Security Advisory SYSS-2022-016

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-016.txt
[3] SySS GmbH, SySS Responsible Disclosure Policy
https://www.syss.de/en/responsible-disclosure-policy



Credits:

This security vulnerability was found by Matthias Deeg of SySS GmbH.

E-Mail: matthias.deeg (at) syss.de
Public Key: 
https://www.syss.de/fileadmin/dokumente/Materialien/PGPKeys/Matthias_Deeg.asc

Key fingerprint = D1F0 A035 F06C E675 CDB9 0514 D9A4 BF6A 34AD 4DAB



Disclaimer:

The information provi

[FD] [SYSS-2022-004]: Verbatim Keypad Secure USB 3.2 Gen 1 Drive - Expected Behavior Violation (CWE-440) (CVE-2022-28386)

2022-06-11 Thread Matthias Deeg

Advisory ID:   SYSS-2022-004
Product:   Keypad Secure USB 3.2 Gen 1 Drive
Manufacturer:  Verbatim
Affected Version(s):   Part Number #49428
Tested Version(s): Part Number #49428
Vulnerability Type:Expected Behavior Violation (CWE-440)
Risk Level:Low
Solution Status:   Open
Manufacturer Notification: 2022-01-27
Solution Date: -
Public Disclosure: 2022-06-08
CVE Reference: CVE-2022-28386
Author of Advisory: Matthias Deeg (SySS GmbH)



Overview:

The Verbatim Keypad Secure is a USB drive with AES 256-bit hardware
encryption and a built-in keypad for passcode entry.

The manufacturer describes the product as follows:

"The AES 256-bit Hardware Encryption seamlessly encrypts all data on the
drive in real-time with a built-in keypad for passcode input. The USB
Drive does not store passwords in the computer or system's volatile
memory making it far more secure than software encryption. Also, if it
falls into the wrong hands, the device will lock and require
re-formatting after 20 failed passcode attempts."[1]

The security feature for locking and requiring to reformat the USB drive
after 20 failed unlock attempts does not work as specified.



Vulnerability Details:

When analyzing the USB drive Verbatim Keypad Secure, Matthias Deeg found
out that the device will not lock and require reformatting after 20
failed passcode attempts, as described in the product description[1]
and the corresponding user manual[2].

Thus, an attacker with physical access to such a USB drive can try more
passcodes in order to unlock the device.

During the security analysis, SySS could not find out how many failed
passcode attempts would actually lock the device and require
reformatting it, as this device state was never reached.

Additionally, trying to find out the correct passcode by either manually
or automatically entering them via the provided keypad is rather
insufficient compared to an equally possible offline brute-force attack
described in SySS security advisory SYSS-2022-001[3].



Proof of Concept (PoC):

SySS tried to unlock the Verbatim Keypad Secure USB drive with more than
20 consecutively entered wrong passcodes.

Afterwards, contrary to the product description, the USB drive could
still be successfully unlocked with the correct passcode, and access to
the previously stored data was possible without any issues.



Solution:

SySS GmbH is not aware of a solution for the described security issue.



Disclosure Timeline:

2022-01-27: Vulnerability reported to manufacturer
2022-02-11: Vulnerability reported to manufacturer again
2022-03-07: Vulnerability reported to manufacturer again
2022-06-08: Public release of security advisory



References:

[1] Product website for Verbatim Keypad Secure

https://www.verbatim-europe.co.uk/en/prod/verbatim-keypad-secure-usb-32-gen-1-drive-64gb-49428/#
[2] Verbatim Keypad Secure USB Manual

https://www.verbatim-marcom.com/image_Verbatim-49428_Keypad-Secure-USB-User-Manual_548705.pdf
[3] SySS Security Advisory SYSS-2022-001

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-001.txt
[4] SySS Security Advisory SYSS-2022-004

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-004.txt
[5] SySS GmbH, SySS Responsible Disclosure Policy
https://www.syss.de/en/responsible-disclosure-policy



Credits:

This security vulnerability was found by Matthias Deeg of SySS GmbH.

E-Mail: matthias.deeg (at) syss.de
Public Key: 
https://www.syss.de/fileadmin/dokumente/Materialien/PGPKeys/Matthias_Deeg.asc

Key fingerprint = D1F0 A035 F06C E675 CDB9 0514 D9A4 BF6A 34AD 4DAB



Disclaimer:

The information provided in this security advisory is provided "as is"
and without warranty of any kind. Details of this security advisory may
be updated in order to provide as accurate information as possible. The
latest version of this security advisory is available on the SySS website.



Copyright:

Creative Commons - Attribution (by) - Version 3.0
URL: http://creativecommons.org/licenses/by/3.0/deed.en



OpenPGP_signature
Description: OpenPGP digital signature
___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinf

[FD] [SYSS-2022-008]: Verbatim Store 'n' Go Secure Portable HDD - Expected Behavior Violation (CWE-440) (CVE-2022-28386)

2022-06-11 Thread Matthias Deeg

Advisory ID:   SYSS-2022-008
Product:   Store 'n' Go Secure Portable HDD
Manufacturer:  Verbatim
Affected Version(s):   GD25LK01-3637-C VER4.0
Tested Version(s): GD25LK01-3637-C VER4.0
Vulnerability Type:Expected Behavior Violation (CWE-440)
Risk Level:Low
Solution Status:   Open
Manufacturer Notification: 2022-01-31
Solution Date: -
Public Disclosure: 2022-06-08
CVE Reference: CVE-2022-28386
Author of Advisory:Matthias Deeg (SySS GmbH)



Overview:

The Verbatim Store 'n' Go Secure Portable HDD is a portable USB drive
with AES 256-bit hardware encryption and a built-in keypad for passcode
entry.

The manufacturer describes the product as follows:

"The AES 256-bit Hardware Encryption seamlessly encrypts all data on the
drive in real-time with a built-in keypad for password input. The SSD
does not store passwords in the computer or system's volatile memory
making it far more secure than software encryption. Also, if it falls
into the wrong hands, the SSD will lock and require re-formatting after
20 failed password attempts."[1]

The security feature for locking and requiring to reformat the SSD after
20 failed unlock attempts does not work as specified.



Vulnerability Details:

When analyzing the external SSD Verbatim Store 'n' Go Secure Portable
HDD, Matthias Deeg found out that the device will not lock and require
reformatting after 20 failed passcode attempts, as described in the
product description[1] and the corresponding user manual[2].

Thus, an attacker with physical access to such an external SSD can try
more passcodes in order to unlock the device.

During the security analysis, SySS could not find out how many failed
passcode attempts would actually lock the device and require
reformatting it, as this device state was never reached.

Additionally, trying to find out the correct passcode by either manually
or automatically entering them via the provided keypad is rather
insufficient compared to an equally possible offline brute-force attack
described in SySS security advisory SYSS-2022-005[3].



Proof of Concept (PoC):

SySS tried to unlock the Verbatim Store 'n' Go Secure Portable HDD with
more than 20 consecutively entered wrong passcodes.

Afterwards, contrary to the product description, the external SSD could
still be successfully unlocked with the correct passcode, and access to
the previously stored data was possible without any issues.



Solution:

SySS GmbH is not aware of a solution for the described security issue.



Disclosure Timeline:

2022-01-31: Vulnerability reported to manufacturer
2022-02-11: Vulnerability reported to manufacturer again
2022-03-07: Vulnerability reported to manufacturer again
2022-06-08: Public release of security advisory



References:

[1] Product website for Verbatim Store 'n' Go Secure Portable HDD

https://www.verbatim-europe.co.uk/en/prod/store-n-go-portable-ssd-with-keypad-access-256gb-53402/
[2] Verbatim Keypad Secure User Manual

https://www.verbatim-marcom.com/image_Verbatim-53402_Verbatim-Keypad-Secure-User-Manual-English_422400.pdf
[3] SySS Security Advisory SYSS-2022-005

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-005.txt
[4] SySS Security Advisory SYSS-2022-008

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-008.txt
[5] SySS GmbH, SySS Responsible Disclosure Policy
https://www.syss.de/en/responsible-disclosure-policy



Credits:

This security vulnerability was found by Matthias Deeg of SySS GmbH.

E-Mail: matthias.deeg (at) syss.de
Public Key: 
https://www.syss.de/fileadmin/dokumente/Materialien/PGPKeys/Matthias_Deeg.asc

Key fingerprint = D1F0 A035 F06C E675 CDB9 0514 D9A4 BF6A 34AD 4DAB



Disclaimer:

The information provided in this security advisory is provided "as is"
and without warranty of any kind. Details of this security advisory may
be updated in order to provide as accurate information as possible. The
latest version of this security advisory is available on the SySS website.



Copyright:

Creative Commons - Attribution (by) - Version 3.0
URL: http://creativecommons.org/licenses/by/3.0/deed.en



OpenPGP_signature
Description: OpenPGP digital signature

[FD] [SYSS-2022-010]: Verbatim Executive Fingerprint Secure SSD - Use of a Cryptographic Primitive with a Risky Implementation (CWE-1240) (CVE-2022-28382)

2022-06-11 Thread Matthias Deeg

Advisory ID:   SYSS-2022-010
Product:   Executive Fingerprint Secure SSD
Manufacturer:  Verbatim
Affected Version(s):   GDMSFE01-INI3637-C VER1.1
Tested Version(s): GDMSFE01-INI3637-C VER1.1
Vulnerability Type:Use of a Cryptographic Primitive with a Risky
   Implementation (CWE-1240)
Risk Level:Low
Solution Status:   Open
Manufacturer Notification: 2022-02-03
Solution Date: -
Public Disclosure: 2022-06-08
CVE Reference: CVE-2022-28382
Author of Advisory:Matthias Deeg (SySS GmbH)



Overview:

The Verbatim Executive Fingerprint Secure SSD is a USB drive with AES
256-bit hardware encryption and a built-in fingerprint sensor for
unlocking the device with previously registered fingerprints.

The manufacturer describes the product as follows:

"The AES 256-bit Hardware Encryption seamlessly encrypts all data on the
drive in real-time. The drive is compliant with GDPR requirements as
100% of the drive is securely encrypted. The built-in fingerprint
recognition system allows access for up to eight authorised users and
one administrator who can access the device via a password. The SSD
does not store passwords in the computer or system's volatile memory
making it far more secure than software encryption."[1]

Due to the use of an insecure encryption AES mode (Electronic Codebook),
an attacker may be able to extract information even from
encrypted data, for example by observing repeating byte patterns.



Vulnerability Details:

When analyzing the Verbatim Executive Fingerprint Secure SSD, Matthias
Deeg found out that the firmware of the USB-to-SATA bridge controller
INIC-3637EN uses AES-256 with the ECB (Electronic Codebook) mode.

This operation mode of block ciphers like AES encrypts identical
plaintext data, in this case blocks of 16 bytes, always to identical
ciphertext data.

For some data, for instance bitmap images, the lack of the cryptographic
property called diffusion concerning the ECB mode can leak sensitive
information even in encrypted data.

One famous example for this is an ECB-encrypted image of the TUX
penguin, which, for instance, is referenced in the Wikipedia article
about block cipher modes of operation[2] to illustrate this issue.

Thus, the use of the ECB operation mode can put the confidentiality of
specific information at risk, even in an encrypted form.

Additionally, in attack scenarios where an attacker has short-time
physical access to a Verbatim Executive Fingerprint Secure SSD, and
later returns it to its legitimate owner, the attacker may be able to
compromise the integrity of the stored data by exploiting the fact
that the same 16-byte plaintext blocks result in the same 16-byte
ciphertext blocks, by replacing specific encrypted 16-byte blocks with
other ones.



Proof of Concept (PoC):

The same 16 byte long plaintext pattern was written several times to an
unlocked Verbatim Executive Fingerprint Secure SSD.

When the SSD was then read using another SSD enclosure, the same 16
byte long ciphertext pattern could be observed for the corresponding
plaintext data.



Solution:

SySS GmbH is not aware of a solution for the described security issue.



Disclosure Timeline:

2022-02-03: Vulnerability reported to manufacturer
2022-02-11: Vulnerability reported to manufacturer again
2022-03-07: Vulnerability reported to manufacturer again
2022-06-08: Public release of security advisory



References:

[1] Product website for Verbatim Executive Fingerprint Secure SSD

https://www.verbatim-europe.co.uk/en/prod/executive-fingerprint-secure-ssd-usb-32-gen-1--usb-c-1tb-53657/
[2] Wikipedia article about block cipher mode of operation

https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation#Electronic_codebook_(ECB)
[3] SySS Security Advisory SYSS-2022-010

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-010.txt
[4] SySS GmbH, SySS Responsible Disclosure Policy
https://www.syss.de/en/responsible-disclosure-policy



Credits:

This security vulnerability was found by Matthias Deeg of SySS GmbH.

E-Mail: matthias.deeg (at) syss.de
Public Key: 
https://www.syss.de/fileadmin/dokumente/Materialien/PGPKeys/Matthias_Deeg.asc

Key fingerprint = D1F0 A035 F06C E675 CDB9 0514 D9A4 BF6A 34AD 4DAB



Disclaimer:

The information provided in thi

[FD] [SYSS-2022-013]: Verbatim Executive Fingerprint Secure SSD - Insufficient Verification of Data Authenticity (CWE-345) (CVE-2022-28385)

2022-06-11 Thread Matthias Deeg

Advisory ID:   SYSS-2022-013
Product:   Executive Fingerprint Secure SSD
Manufacturer:  Verbatim
Affected Version(s):   GDMSFE01-INI3637-C VER1.1
Tested Version(s): GDMSFE01-INI3637-C VER1.1
Vulnerability Type:Insufficient Verification of Data 
Authenticity (CWE-345)

Risk Level:Low
Solution Status:   Open
Manufacturer Notification: 2022-02-03
Solution Date: -
Public Disclosure: 2022-06-08
CVE Reference: CVE-2022-28385
Author of Advisory:Matthias Deeg (SySS GmbH)



Overview:

The Verbatim Executive Fingerprint Secure SSD is a USB drive with AES
256-bit hardware encryption and a built-in fingerprint sensor for
unlocking the device with previously registered fingerprints.

The manufacturer describes the product as follows:

"The AES 256-bit Hardware Encryption seamlessly encrypts all data on the
drive in real-time. The drive is compliant with GDPR requirements as
100% of the drive is securely encrypted. The built-in fingerprint
recognition system allows access for up to eight authorised users and
one administrator who can access the device via a password. The SSD
does not store passwords in the computer or system's volatile memory
making it far more secure than software encryption."[1]

Due to missing integrity checks, an attacker can manipulate the content
of the emulated CD-ROM drive containing the Windows and macOS client
software.



Vulnerability Details:

When analyzing the Verbatim Executive Fingerprint Secure SSD, Matthias
Deeg found out that the content of the emulated CD-ROM drive containing
the Windows and macOS client software can be manipulated.

The content of this emulated CD-ROM drive is stored as ISO-9660 image
in the "hidden" sectors of the USB drive that can only be accessed
using special IOCTL commands, or when installing the drive in an
external disk enclosure.

The following output exemplarily shows the content of the ISO-9660
file system:


# mount hidden_sectors.bin /mnt/

# lsd -laR /mnt/
dr-xr-xr-x root root 2.0 KB Wed Apr  1 09:29:50 2020  .
drwxr-xr-x root root 4.0 KB Fri Jan  7 16:39:47 2022  ..
.r-xr-xr-x root root  70 B  Wed Aug 14 09:20:40 2019  Autorun.inf
dr-xr-xr-x root root 2.0 KB Wed Apr  1 09:29:50 2020  MAC
dr-xr-xr-x root root 2.0 KB Wed Apr  1 09:29:50 2020  Windows

/mnt/MAC:
dr-xr-xr-x root root 2.0 KB Wed Apr  1 09:29:50 2020  .
dr-xr-xr-x root root 2.0 KB Wed Apr  1 09:29:50 2020  ..
dr-xr-xr-x root root 2.0 KB Wed Apr  1 09:29:50 2020  setup.app
dr-xr-xr-x root root 2.0 KB Wed Apr  1 09:29:50 2020  Source

/mnt/MAC/setup.app:
dr-xr-xr-x root root 2.0 KB Wed Apr  1 09:29:50 2020  .
dr-xr-xr-x root root 2.0 KB Wed Apr  1 09:29:50 2020  ..
dr-xr-xr-x root root 2.0 KB Wed Apr  1 09:29:50 2020  Contents

/mnt/MAC/setup.app/Contents:
dr-xr-xr-x root root 2.0 KB Wed Apr  1 09:29:50 2020  .
dr-xr-xr-x root root 2.0 KB Wed Apr  1 09:29:50 2020  ..
dr-xr-xr-x root root 2.0 KB Wed Apr  1 09:29:50 2020  _CodeSignature
.r-xr-xr-x root root 1.4 KB Thu Oct 24 06:58:18 2019  Info.plist
dr-xr-xr-x root root 2.0 KB Wed Apr  1 09:29:50 2020  MacOS
.r-xr-xr-x root root   8 B  Thu Oct 24 06:58:18 2019  PkgInfo
dr-xr-xr-x root root 2.0 KB Wed Apr  1 09:29:50 2020  Resources

/mnt/MAC/setup.app/Contents/_CodeSignature:
dr-xr-xr-x root root 2.0 KB Wed Apr  1 09:29:50 2020  .
dr-xr-xr-x root root 2.0 KB Wed Apr  1 09:29:50 2020  ..
.r-xr-xr-x root root 3.6 KB Thu Oct 24 07:06:02 2019  CodeResources

/mnt/MAC/setup.app/Contents/MacOS:
dr-xr-xr-x root root 2.0 KB Wed Apr  1 09:29:50 2020  .
dr-xr-xr-x root root 2.0 KB Wed Apr  1 09:29:50 2020  ..
.r-xr-xr-x root root  30 KB Thu Oct 24 07:06:02 2019  setup

/mnt/MAC/setup.app/Contents/Resources:
dr-xr-xr-x root root 2.0 KB Wed Apr  1 09:29:50 2020  .
dr-xr-xr-x root root 2.0 KB Wed Apr  1 09:29:50 2020  ..
dr-xr-xr-x root root 2.0 KB Wed Apr  1 09:29:50 2020  Base.lproj

/mnt/MAC/setup.app/Contents/Resources/Base.lproj:
dr-xr-xr-x root root 2.0 KB Wed Apr  1 09:29:50 2020  .
dr-xr-xr-x root root 2.0 KB Wed Apr  1 09:29:50 2020  ..
dr-xr-xr-x root root 2.0 KB Wed Apr  1 09:29:50 2020  Main.storyboardc

/mnt/MAC/setup.app/Contents/Resources/Base.lproj/Main.storyboardc:
dr-xr-xr-x root root 2.0 KB Wed Apr  1 09:29:50 2020  .
dr-xr-xr-x root root 2.0 KB Wed Apr  1 09:29:50 2020  ..
.r-xr-xr-x root root 445 B  Thu Oct 24 06:58:18 2019  Info.plist
.r-xr-xr-x root root  35 KB Thu Oct 24 06:58:18 2019  MainMenu.nib
.r-xr-xr-x root root 3.5 KB Thu Oct 24 06:58:18 2019  
NSWindowController-B8D-0N-5wS.nib
.r-xr-xr-x root root 1.2 KB Thu Oct 24 06:58:18 2019  
XfG-lQ-9wD-view-m2S-Jp-Qdl.nib


/mnt/MAC/Source:
dr-xr-xr-x root root 2.0 KB Wed Apr  1 09:29:50 2020  .
dr-xr-xr-x root root 2.0 KB Wed Apr  1 09:29:50 2020  ..
.r-xr-x

[FD] [SYSS-2022-024]: Lepin EP-KP001 - Violation of Secure Design Principles (CWE-657) (CVE-2022-29948)

2022-06-11 Thread Matthias Deeg

Advisory ID:   SYSS-2022-024
Product:   EP-KP001
Manufacturer:  Lepin
Affected Version(s):   KP001_V19
Tested Version(s): KP001_V19
Vulnerability Type:Violation of Secure Design Principles (CWE-657)
Risk Level:High
Solution Status:   Open
Manufacturer Notification: 2022-04-12
Solution Date: -
Public Disclosure: 2022-06-10
CVE Reference: CVE-2022-29948
Author of Advisory:Matthias Deeg (SySS GmbH)



Overview:

The Lepin EP-KP001 is a USB flash drive with AES-256 hardware encryption
and a built-in keypad for passcode entry.

The manufacturer describes the product as follows (see [1]):

"[Safeguard Your Sensitive DATA] With Military Grade Full-disk 256-bit
AES XTS Hardware Encryption to protect your important files. All your
data is protected by hardware encryption, so no one can access your
data without knowing the password."

Due to an insecure design, the Lepin EP-KP001 flash drive is vulnerable
to an authentication bypass attack which enables an attacker to gain
unauthorized access to the stored encrypted data.



Vulnerability Details:

When analyzing the USB flash drive Lepin EP-KP001, Matthias Deeg found
out that it uses an insecure hardware design which allows an attacker
to bypass the password-based user authentication.

The Lepin EP-KP001 consists of the following four main parts:

1. An unknown NAND flash memory chip
2. An Alcor Micro flash disk controller (AU6989SNBL-GTD)
3. An unknown microcontroller (unkmarked chip) used as keypad controller
4. A high-speed analog switch (SGM7222)

The encrypted disk partition with the stored user data can be unlocked
by entering the correct passcode via the keypad and pressing the
"unlock" button.

Due to the performed analysis, the password-based user authentication
via a passcode comprised of 6 to 14 digits is performed by the unknown
microcontroller.

By replacing this unknown microcontroller on a target device with one
from an attacker-controlled Lepin EP-KP001 whose passcode was known, it
was possible to successfully unlock the targeted Lepin EP-KP001 USB
flash drive and to gain unauthorized access to the stored data in
cleartext.



Proof of Concept (PoC):

A successful authentication bypass attack could be performed via the
following steps:

1. Set a passcode on an attacker-controlled Lepin EP-KP001.

2. Desolder the unmarked microcontroller from the attacker-controlled
   device.

3. Desolder the unmarked microcontroller from the targeted Lepin
   EP-KP001.

4. Solder the unmarked microcontroller from the attacker-controlled
   device on the targeted device.

5. Unlock the targeted device with the initially set and known passcode.



Solution:

SySS is not aware of a security fix for the described security issue.



Disclosure Timeline:

2022-04-12: Vulnerability reported to manufacturer
2022-06-10: Public release of security advisory



References:

[1] Product website for Lepin EP-KP001

https://www.amazon.com/Encrypted-Password-Aluminum-Portable-Protected/dp/B06W5H9GP7/
[2] SySS Security Advisory SYSS-2022-024

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-024.txt
[4] SySS GmbH, SySS Responsible Disclosure Policy
https://www.syss.de/en/responsible-disclosure-policy



Credits:

This security vulnerability was found by Matthias Deeg of SySS GmbH.

E-Mail: matthias.deeg (at) syss.de
Public Key: 
https://www.syss.de/fileadmin/dokumente/Materialien/PGPKeys/Matthias_Deeg.asc

Key fingerprint = D1F0 A035 F06C E675 CDB9 0514 D9A4 BF6A 34AD 4DAB



Disclaimer:

The information provided in this security advisory is provided "as is"
and without warranty of any kind. Details of this security advisory may
be updated in order to provide as accurate information as possible. The
latest version of this security advisory is available on the SySS website.



Copyright:

Creative Commons - Attribution (by) - Version 3.0
URL: http://creativecommons.org/licenses/by/3.0/deed.en



OpenPGP_signature
Description: OpenPGP digital signature
___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/

[FD] [SYSS-2022-043]: Verbatim Store 'n' Go Secure Portable SSD - Use of a Cryptographic Primitive with a Risky Implementation (CWE-1240) (CVE-2022-28384)

2022-10-08 Thread Matthias Deeg

Advisory ID:   SYSS-2022-043
Product:   Store 'n' Go Secure Portable SSD
Manufacturer:  Verbatim
Affected Version(s):   #53402 (GDMSLK02 C-INIC3637-V1.1)
Tested Version(s): #53402 (GDMSLK02 C-INIC3637-V1.1)
Vulnerability Type:Use of a Cryptographic Primitive with a Risky
   Implementation (CWE-1240)
Risk Level:High
Solution Status:   Fixed
Manufacturer Notification: 2022-06-29
Solution Date: 2022-07
Public Disclosure: 2022-10-07
CVE Reference: CVE-2022-28384
Author of Advisory:Matthias Deeg (SySS GmbH)



Overview:

The Verbatim Store 'n' Go Secure Portable SSD is a portable USB drive
with AES 256-bit hardware encryption and a built-in keypad for passcode
entry.

The manufacturer describes the product as follows:

"The AES 256-bit Hardware Encryption seamlessly encrypts all data on the
drive in real-time with a built-in keypad for password input. The hard
drive does not store passwords in the computer or system’s volatile
memory making it far more secure than software encryption. Also, if it
falls into the wrong hands, the hard drive will lock and require
re-formatting after 20 failed password attempts."[1]

Due to an insecure design, the Verbatim Store 'n' Go Secure Portable SSD
is vulnerable to an offline brute-force attack for finding out the
correct passcode and thus gaining unauthorized access to the stored
encrypted data.



Vulnerability Details:

When analyzing the external storage device Verbatim Store 'n' Go Secure
Portable SSD, Matthias Deeg found out that it uses an insecure design
which allows for offline brute-force attacks against the passcode.

The device consists of the following four main parts:

1. An SSD with M.2 form factor
2. A USB-to-SATA bridge controller (INIC-3637EN)
3. An SPI flash memory chip (XT25F01D) containing the firmware of the
   INIC-3637EN
4. A keypad controller (unknown chip, marked "SW611 2201")

For encrypting the data stored on the SSD, the hardware AES engine of
the INIC-3637EN is used. More specifically, AES-256 in ECB (Electronic
Codebook) mode is used for data encryption, which is also a security
issue by itself described in SySS security advisory SYSS-2022-044[2].

The cryptographic key for the actual data encryption, the so-called data
encryption key (DEK), is stored in a special sector of the SSD which in
turn is encrypted using AES-256-ECB with a so-called key encryption key
(KEK).

This KEK is derived from the entered passcode which can be between five
and twelve digits long, and generated by the keypad controller.

When the unlock button is pressed on the Verbatim Store 'n' Go Secure
Portable SSD, this generated AES 256-bit key is transmitted via SPI
communication from the keypad controller to the USB-to-SATA bridge
controller INIC-3637EN for configuring the corresponding hardware AES
engine.

For verifying the entered passcode, the firmware of the INIC-3637EN
reads and decrypts the special sector on the SSD with the provided KEK
and checks specific data offsets for the known byte pattern (signature)
"0x20 0x49 0x4E 0x49" which represents the string " INI".

If this byte pattern could successfully be found, the entered passcode
and its derived AES key is very likely correct and grants the firmware
access to the decrypted DEK, which can then be used to decrypt the
actual SSD user data.

This described design of the Verbatim Store 'n' Go Secure Portable SSD
allows for offline brute-force attacks for finding the correct passcode,
because an attacker can generate and observe the derived AES keys (KEK)
of the keypad for all possible passcodes and then try to correctly
decrypt the data of a specific SSD sector. If the magic byte pattern
" INI" can be detected in the expected places of the resulting plaintext,
the correct passcode is found, which then allows for gaining
unauthorized access to the encrypted user data.



Proof of Concept (PoC):

For demonstrating the offline brute-force attack, Matthias Deeg
developed a sample brute-forcing software tool which checks the complete
search space of all possible passcodes between five and twelve digits.

The following output exemplarily shows a successful attack.

>VKSCracker.exe
 _   _ _   __ _   __
| | | | | / //  ___| /  __ \  | |
| | | | |/ / \ `--.  | /  \/_ __ __ _  ___| | _ _ __
| | | |\  `--. \ | |   | '__/ _` |/ __| |/ / _ \ '__|
\ \_/ / |\  \/\__/ / | \__/\ | | (_| | (__|   <  __/ |
 \___/\_| \_/\/   \/_|  \__,_|\___|_|\_\___|_|
 ... finds out your passcode.

Verbatim Keypad Secure Cracker v0.6 by Matthias Deeg 
 (c) 2022

---
[*] Found 8 l

[FD] [SYSS-2022-044]: Verbatim Store 'n' Go Secure Portable SSD - Use of a Cryptographic Primitive with a Risky Implementation (CWE-1240) (CVE-2022-28382)

2022-10-08 Thread Matthias Deeg

Advisory ID:   SYSS-2022-044
Product:   Store 'n' Go Secure Portable SSD
Manufacturer:  Verbatim
Affected Version(s):   #53402 (GDMSLK02 C-INIC3637-V1.1)
Tested Version(s): #53402 (GDMSLK02 C-INIC3637-V1.1)
Vulnerability Type:Use of a Cryptographic Primitive with a Risky
   Implementation (CWE-1240)
Risk Level:Low
Solution Status:   Fixed
Manufacturer Notification: 2022-06-29
Solution Date: 2022-07
Public Disclosure: 2022-10-07
CVE Reference: CVE-2022-28382
Author of Advisory:Matthias Deeg (SySS GmbH)



Overview:

The Verbatim Store 'n' Go Secure Portable SSD is a portable USB drive
with AES 256-bit hardware encryption and a built-in keypad for passcode
entry.

The manufacturer describes the product as follows:

"The AES 256-bit Hardware Encryption seamlessly encrypts all data on the
drive in real-time with a built-in keypad for password input. The hard
drive does not store passwords in the computer or system’s volatile
memory making it far more secure than software encryption. Also, if it
falls into the wrong hands, the hard drive will lock and require
re-formatting after 20 failed password attempts."[1]

Due to the use of an insecure encryption AES mode (Electronic Codebook),
an attacker may be able to extract information even from
encrypted data, for example by observing repeating byte patterns.



Vulnerability Details:

When analyzing the external storage device Verbatim Store 'n' Go Secure
Portable SSD, Matthias Deeg found out that the firmware of the
USB-to-SATA bridge controller INIC-3637EN uses AES-256 with the ECB
(Electronic Codebook) mode.

This operation mode of block ciphers like AES encrypts identical
plaintext data, in this case blocks of 16 bytes, always to identical
ciphertext data.

For some data, for instance bitmap images, the lack of the cryptographic
property called diffusion concerning the ECB mode can leak sensitive
information even in encrypted data.

One famous example for this is an ECB-encrypted image of the TUX
penguin, which, for instance, is referenced in the Wikipedia article
about block cipher modes of operation[2] to illustrate this issue.

Thus, the use of the ECB operation mode can put the confidentiality of
specific information at risk, even in an encrypted form.

Additionally, in attack scenarios where an attacker has short-time
physical access to a Verbatim Store 'n' Go Portable Secure SSD, and
later returns it to its legitimate owner, the attacker may be able to
compromise the integrity of the stored data by exploiting the fact that
the same 16-byte plaintext blocks result in the same 16-byte ciphertext
blocks, by replacing specific encrypted 16-byte blocks with other ones.



Proof of Concept (PoC):

The same plaintext pattern with the length of 16 bytes was written
several times to an unlocked Verbatim Store 'n' Go Secure Portable SSD.

When the SSD was then read using another SSD enclosure, the same 16
byte long ciphertext pattern could be observed for the corresponding
plaintext data.



Solution:

The described security issue was fixed by the Verbatim "Security Update
July 2022"[4].



Disclosure Timeline:

2022-06-29: Vulnerability reported to manufacturer
2022-07   : Manufacturer publishes security update[4]
2022-10-07: Public release of security advisory



References:

[1] Product website for Verbatim Store 'n' Go Secure Portable SSD

https://www.verbatim-europe.co.uk/en/prod/store-n-go-portable-ssd-with-keypad-access-256gb-53402/
[2] Wikipedia article about block cipher mode of operation

https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation#Electronic_codebook_(ECB)
[3] SySS Security Advisory SYSS-2022-044

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-044.txt
[4] Security Update July 2022: Store 'n' Go Portable SSD
https://www.verbatim-europe.co.uk/en/support-centre/?part_no=53402
[5] SySS GmbH, SySS Responsible Disclosure Policy
https://www.syss.de/en/responsible-disclosure-policy



Credits:

This security vulnerability was found by Matthias Deeg of SySS GmbH.

E-Mail: matthias.deeg (at) syss.de
Public Key: 
https://www.syss.de/fileadmin/dokumente/Materialien/PGPKeys/Matthias_Deeg.asc

Key fingerprint = D1F0 A035 F06C E675 CDB9 0514 D9A4 BF6A 34AD 4DAB



Disclaimer:

The 

[FD] [SYSS-2022-045]: Verbatim Store 'n' Go Secure Portable SSD - Missing Immutable Root of Trust in Hardware (CWE-1326) (CVE-2022-28383)

2022-10-08 Thread Matthias Deeg

Advisory ID:   SYSS-2022-045
Product:   Store 'n' Go Secure Portable SSD
Manufacturer:  Verbatim
Affected Version(s):   #53402 (GDMSLK02 C-INIC3637-V1.1)
Tested Version(s): #53402 (GDMSLK02 C-INIC3637-V1.1)
Vulnerability Type:Missing Immutable Root of Trust in Hardware 
(CWE-1326)

Risk Level:Medium
Solution Status:   Fixed
Manufacturer Notification: 2022-06-29
Solution Date: -
Public Disclosure: 2022-10-07
CVE Reference: CVE-2022-28383
Author of Advisory:Matthias Deeg (SySS GmbH)



Overview:

The Verbatim Store 'n' Go Secure Portable SSD is a portable USB drive
with AES 256-bit hardware encryption and a built-in keypad for passcode
entry.

The manufacturer describes the product as follows:

"The AES 256-bit Hardware Encryption seamlessly encrypts all data on the
drive in real-time with a built-in keypad for password input. The hard
drive does not store passwords in the computer or system’s volatile
memory making it far more secure than software encryption. Also, if it
falls into the wrong hands, the hard drive will lock and require
re-formatting after 20 failed password attempts."[1]

Due to insufficient firmware validation, an attacker can store
malicious firmware code for the USB-to-SATA bridge controller on the
external drive, which gets executed.



Vulnerability Details:

When analyzing the external data storage Verbatim Store 'n' Go Secure
Portable SSD, Matthias Deeg found out that the validation of the
firmware for the USB-to-SATA bridge controller INIC-3637EN only consists
of a simple CRC-16 check (XMODEM CRC-16).

Thus, an attacker is able to store malicious firmware code for the
INIC-3637EN with a correct checksum on the used SPI flash memory chip
(XT25F01D), which then gets successfully executed by the USB-to-SATA
bridge controller.

For instance, this security vulnerability could be exploited in a
so-called "supply chain attack" when the device is still on its way to
its legitimate user.

An attacker with temporary physical access during the supply could
program a modified firmware on the Verbatim Keypad Secure, which always
uses an attacker-controlled AES key for the data encryption, for
example.

If, later on, the attacker gains access to the used USB drive, he
can simply decrypt all contained user data.



Proof of Concept (PoC):

SySS was able to read and write the SPI flash memory containing the
firmware of the INIC-3637EN controller (128 KB) using a universal
programmer.

By analyzing the dumped memory content, SySS found out that the
INIC-3637EN firmware is stored from the file offset 0x4000 to the file
offset 0x1BFFB, and that the corresponding XMODEM CRC-16 is stored at
the file offset 0x1FFFC.

Matthias Deeg developed a simple Python tool for updating the checksum
of modified firmware images before writing them to the SPI flash memory
chip.

The following output exemplarily shows updating a modified firmware
image:

$ python update-firmaware.py firmware_hacked.bin
Verbatim Store 'n' Go Firmware Updater v0.1 - Matthias Deeg, SySS GmbH 
(c) 2022

[*] Computed CRC-16 (0x0874) does not match stored CRC-16 (0x5E8C).
[*] Successfully updated firmware file



Solution:

SySS GmbH is not aware of a solution for the described security issue.



Disclosure Timeline:

2022-06-29: Vulnerability reported to manufacturer
2022-10-07: Public release of security advisory



References:

[1] Product website for Verbatim Store 'n' Go Secure Portable SSD

https://www.verbatim.com.au/products/store-n-go-portable-ssd-with-keypad-access/
[2] SySS Security Advisory SYSS-2022-045

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-045.txt
[3] SySS GmbH, SySS Responsible Disclosure Policy
https://www.syss.de/en/responsible-disclosure-policy



Credits:

This security vulnerability was found by Matthias Deeg of SySS GmbH.

E-Mail: matthias.deeg (at) syss.de
Public Key: 
https://www.syss.de/fileadmin/dokumente/Materialien/PGPKeys/Matthias_Deeg.asc

Key fingerprint = D1F0 A035 F06C E675 CDB9 0514 D9A4 BF6A 34AD 4DAB



Disclaimer:

The information provided in this security advisory is provided "as is"
and without warranty of any kind. Details of this security advisory may
be updated in order to provide as accurate information as possible. The
latest version of this 

[FD] [SYSS-2022-046]: Verbatim Store 'n' Go Secure Portable SSD - Expected Behavior Violation (CWE-440) (CVE-2022-28386)

2022-10-08 Thread Matthias Deeg

Advisory ID:   SYSS-2022-046
Product:   Store 'n' Go Secure Portable SSD
Manufacturer:  Verbatim
Affected Version(s):   #53402 (GDMSLK02 C-INIC3637-V1.1)
Tested Version(s): #53402 (GDMSLK02 C-INIC3637-V1.1)
Vulnerability Type:Expected Behavior Violation (CWE-440)
Risk Level:Low
Solution Status:   Open
Manufacturer Notification: 2022-06-29
Solution Date: -
Public Disclosure: 2022-10-07
CVE Reference: CVE-2022-28386
Author of Advisory:Matthias Deeg (SySS GmbH)



Overview:

The Verbatim Store 'n' Go Secure Portable SSD is a portable USB drive
with AES 256-bit hardware encryption and a built-in keypad for passcode
entry.

The manufacturer describes the product as follows:

"The AES 256-bit Hardware Encryption seamlessly encrypts all data on the
drive in real-time with a built-in keypad for password input. The hard
drive does not store passwords in the computer or system’s volatile
memory making it far more secure than software encryption. Also, if it
falls into the wrong hands, the hard drive will lock and require
re-formatting after 20 failed password attempts."[1]

The security feature for locking and requiring to reformat the SSD after
20 failed unlock attempts does not work as specified.



Vulnerability Details:

When analyzing the external data storage Verbatim Store 'n' Go Secure
Portable SSD, Matthias Deeg found out that the device will not lock and
require reformatting after 20 failed passcode attempts, as described in
the product description[1] and the corresponding user manual.

Thus, an attacker with physical access to such an external SSD can try
more passcodes in order to unlock the device.

During the security analysis, SySS could not find out how many failed
passcode attempts would actually lock the device and require
reformatting it, as this device state was never reached.

Additionally, trying to find out the correct passcode by either manually
or automatically entering it via the provided keypad is rather
insufficient compared to an equally possible offline brute-force attack,
as described in SySS security advisory SYSS-2022-043[2].



Proof of Concept (PoC):

SySS tried to unlock the Verbatim Store 'n' Go Secure Portable SSD with
more than 20 consecutively entered wrong passcodes.

Afterwards, contrary to the product description, the external SSD could
still be successfully unlocked with the correct passcode, and access to
the previously stored data was possible without any issues.



Solution:

SySS GmbH is not aware of a solution for the described security issue.



Disclosure Timeline:

2022-06-29: Vulnerability reported to manufacturer
2022-10-07: Public release of security advisory



References:

[1] Product website for Verbatim Store 'n' Go Secure Portable SSD

https://www.verbatim.com.au/products/store-n-go-portable-ssd-with-keypad-access/
[2] SySS Security Advisory SYSS-2022-043

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-043.txt
[3] SySS Security Advisory SYSS-2022-046

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-046.txt
[4] SySS GmbH, SySS Responsible Disclosure Policy
https://www.syss.de/en/responsible-disclosure-policy



Credits:

This security vulnerability was found by Matthias Deeg of SySS GmbH.

E-Mail: matthias.deeg (at) syss.de
Public Key: 
https://www.syss.de/fileadmin/dokumente/Materialien/PGPKeys/Matthias_Deeg.asc

Key fingerprint = D1F0 A035 F06C E675 CDB9 0514 D9A4 BF6A 34AD 4DAB



Disclaimer:

The information provided in this security advisory is provided "as is"
and without warranty of any kind. Details of this security advisory may
be updated in order to provide as accurate information as possible. The
latest version of this security advisory is available on the SySS website.



Copyright:

Creative Commons - Attribution (by) - Version 3.0
URL: http://creativecommons.org/licenses/by/3.0/deed.en


OpenPGP_signature
Description: OpenPGP digital signature
___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/

[FD] [SYSS-2023-005]: Omnis Studio - Expected Behavior Violation (CWE-440) (CVE-2023-38335)

2023-07-21 Thread Matthias Deeg via Fulldisclosure

Advisory ID:   SYSS-2023-005
Product:   Omnis Studio
Manufacturer:  Omnis Software Ltd.
Affected Version(s):   10.22.00
Tested Version(s): 10.22.00
Vulnerability Type:Expected Behavior Violation (CWE-440)
Risk Level:Low
Solution Status:   Open
Manufacturer Notification: 2023-03-30
Solution Date: -
Public Disclosure: 2023-07-20
CVE Reference: CVE-2023-38335
Author of Advisory:Matthias Deeg (SySS GmbH)



Overview:

Omnis Studio is a rapid application development tool for developing
cross-platform software applications.

The manufacturer describes the product as follows:

"Omnis Studio is a powerful development environment that lets you deploy
apps to virtually any device, on any platform, including tablets,
smartphones, and desktop computers." [1]

Due to implementation issues, "always private" Omnis libraries can be
opened by the Omnis Studio browser.



Vulnerability Details:

Omnis Studio supports a feature for making Omnis libraries "always
private".

Making an Omnis library "always private" is supposed to be an
irreversible operation according to the Omnis Studio software.

However, during a security analysis of an application developed with
Omnis Studio using this feature, Matthias Deeg found out that it is
still possible to load "always private" Omnis libraries with the Omnis
Studio browser by simply bypassing a specific check.

This violates the expected behavior of an "irreversible operation".



Proof of Concept (PoC):

For demonstrating the described security issue, Matthias Deeg developed
a proof-of-concept software tool which allows loading private Omnis
libraries in the Omnis Studio browser.

>OmnisUnlocker.exe

_
   /_   _ _ 
 \
  //  ___| /  ___/  ___| 
  \
 | \ `--. _   _\ `--.\ `--. 
   |
 |  `--. \ | | |`--. \`--. \ 
   |
 | /\__/ / |_| /\__/ /\__/ / 
   |
  \\/ \__, \/\/   ... unlocks Omnis Studio! 
  /
   \  __/ | 
 /
   / |___/ 
__/

  / _/
(__) /_/
(oo)
  /--\/
 / |____||
*  ||   ||
   ^^   ^^
SySS Omnis Unlocker v1.0 by Matthias Deeg  - (c) 2023

[+] The Omnis Studio process was patched successfully.
Now you can:
* load private Omnis libraries in the browser, and
* analyze locked classes.

This security issue is also demonstrated in our SySS Proof of Concept
Video "Reversing the Irreversible - Part I" on our YouTube channel [3].



Solution:

SySS GmbH is not aware of a solution for the described security issue.



Disclosure Timeline:

2023-03-30: Vulnerability reported to manufacturer
2023-04-06: Vulnerability reported to manufacturer again
2023-07-20: Public release of security advisory



References:

[1] Product website for Omnis Studio
https://www.omnis.net/
[2] SySS Security Advisory SYSS-2023-005

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-005.txt
[3] SySS Proof of Concept Video: Reversing the Irreversible - Part I
https://www.youtube.com/watch?v=2fjMgPqjobQ
[4] SySS GmbH, SySS Responsible Disclosure Policy
https://www.syss.de/en/responsible-disclosure-policy

~~~~

Credits:

This security vulnerability was found by Matthias Deeg of SySS GmbH.

E-Mail: matthias.deeg (at) syss.de
Public Key: 
https://www.syss.de/fileadmin/dokumente/PGPKeys/Matthias_Deeg.asc

Key Fingerprint = D1F0 A035 F06C E675 CDB9 0514 D9A4 BF6A 34AD 4DAB



Disclaimer:

The information provided in this security advisory is provided "as is"
and without warranty of any kind. Details of this security advisory may
be updated in order to provide as accurate information as possible. The
latest version of this security advisory is available on the SySS website.



Copyright:

Creative Commons - Attribution (by) - Version 3.0
URL: http://creativecommons.org/licenses/by/3.0/deed.en



OpenPGP_signature
Description: OpenPGP digital signature
___

[FD] [SYSS-2023-006]: Omnis Studio - Expected Behavior Violation (CWE-440) (CVE-2023-38334)

2023-07-21 Thread Matthias Deeg via Fulldisclosure

Advisory ID:   SYSS-2023-006
Product:   Omnis Studio
Manufacturer:  Omnis Software Ltd.
Affected Version(s):   10.22.00
Tested Version(s): 10.22.00
Vulnerability Type:Expected Behavior Violation (CWE-440)
Risk Level:Low
Solution Status:   Open
Manufacturer Notification: 2023-03-30
Solution Date: -
Public Disclosure: 2023-07-20
CVE Reference: CVE-2023-38334
Author of Advisory:Matthias Deeg (SySS GmbH)



Overview:

Omnis Studio is a rapid application development tool for developing
cross-platform software applications.

The manufacturer describes the product as follows:

"Omnis Studio is a powerful development environment that lets you deploy
apps to virtually any device, on any platform, including tablets,
smartphones, and desktop computers."[1]

Due to implementation issues, locked classes in Omnis libraries can be
unlocked and thus further analyzed and modified via the Omnis Studio
browser.



Vulnerability Details:

Omnis Studio supports an irreversible feature for locking classes within
Omnis libraries.

According to the Omnis Studio software, it should be no longer possible
to delete, view, change, copy, rename, duplicate, or print a locked
class.

However, during a security analysis of an application developed with
Omnis Studio using this feature, Matthias Deeg found out that it is
possible to unlock previously locked classes of Omnis libraries, for
instance by simply bypassing specific checks in Omnis Studio.

This allows for further analyzing and also deleting, viewing, changing,
copying, renaming, duplicating, or printing previously locked Omnis
classes.

This violates the expected behavior of an "irreversible operation".



Proof of Concept (PoC):

For demonstrating the described security issue, Matthias Deeg developed
a proof-of-concept software tool which allows unlocking locked classes
within Omnis libraries and further analyzing and modifying them within
Omnis Studio.

>OmnisUnlocker.exe

_
   /_   _ _ 
 \
  //  ___| /  ___/  ___| 
  \
 | \ `--. _   _\ `--.\ `--. 
   |
 |  `--. \ | | |`--. \`--. \ 
   |
 | /\__/ / |_| /\__/ /\__/ / 
   |
  \\/ \__, \/\/   ... unlocks Omnis Studio! 
  /
   \  __/ | 
 /
   / |___/ 
__/

  / _/
(__) /_/
(oo)
  /--\/
 / |||
*  ||   ||
   ^^   ^^
SySS Omnis Unlocker v1.0 by Matthias Deeg  - (c) 2023

[+] The Omnis Studio process was patched successfully.
Now you can:
* load private Omnis libraries in the browser, and
* analyze locked classes.



Solution:

SySS GmbH is not aware of a solution for the described security issue.



Disclosure Timeline:

2023-03-30: Vulnerability reported to manufacturer
2023-04-06: Vulnerability reported to manufacturer again
2023-07-20: Public release of security advisory



References:

[1] Product website for Omnis Studio
https://www.omnis.net/
[2] SySS Security Advisory SYSS-2023-006

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-006.txt
[3] SySS GmbH, SySS Responsible Disclosure Policy
https://www.syss.de/en/responsible-disclosure-policy



Credits:

This security vulnerability was found by Matthias Deeg of SySS GmbH.

E-Mail: matthias.deeg (at) syss.de
Public Key: 
https://www.syss.de/fileadmin/dokumente/PGPKeys/Matthias_Deeg.asc

Key Fingerprint = D1F0 A035 F06C E675 CDB9 0514 D9A4 BF6A 34AD 4DAB



Disclaimer:

The information provided in this security advisory is provided "as is"
and without warranty of any kind. Details of this security advisory may
be updated in order to provide as accurate information as possible. The
latest version of this security advisory is available on the SySS website.



Copyright:

Creative Commons - Attribution (by) - Version 3.0
URL: http://creativecommons.org/licenses/by/3.0/deed.en


OpenPGP_signature
Description: OpenPGP digital signature
___
Sent through the F

[FD] [SYSS-2023-011]: Canon PIXMA TR4550 and other inkjet printer models - Insufficient or Incomplete Data Removal, within Hardware Component (CWE-1301)

2023-08-03 Thread Matthias Deeg via Fulldisclosure

Advisory ID:   SYSS-2023-011
Product:   PIXMA TR4550
Manufacturer:  Canon
Affected Version(s):   1.020 / 1.080
   also affects many other Canon inkjet printer
   models[4]
Tested Version(s): 1.020 / 1.080
Vulnerability Type:Insufficient or Incomplete Data Removal
   within Hardware Component (CWE-1301)
   Insufficiently Protected Credentials
   (CWE-522)
Risk Level:Low
Solution Status:   Fixed
Manufacturer Notification: 2023-04-06
Solution Date: 2023-07-31
Public Disclosure: 2023-08-03
CVE Reference: No CVE ID from Canon PSIRT
Author of Advisory:Manuel Stotz, SySS GmbH



Overview:

The Canon PIXMA TR4550 is an entry-level 4-in-1 printer equipped with
Wi-Fi connectivity.

The manufacturer describes the product as follows (see [1]):

"Ready to adapt to your smart home office environment, this efficient
4-In-One printer requires minimal space but gives maximum support to
your projects. Whether scanning a document, copying an ID, faxing an
invoice or printing posters, PIXMA TR4550 has the functionality to keep
up with your business needs. Equipped with smart Wi-Fi connectivity to
optimise management of functions and features, this front-loading
4-In-One printer is the compact solution that saves space, streamlines
ink usage and brings productivity to the forefront."

The unprotected storage of credentials and insufficient data removal
during a factory reset allows sensitive data to be read out afterward.



Vulnerability Details:

The Canon PIXMA TR4550 stores sensitive data, such as the SSID and the
Wi-Fi pre-shared key (PSK), unencrypted in its persistent storage
(EEPROM).

Resetting the product to factory settings (via 'Setup', 'Device
settings', 'Reset setting' and 'All data') does not securely delete this
sensitive information.



Proof of Concept (PoC):

SySS could successfully perform a proof-of-concept attack via the
following steps:

* Configure and establish a Wi-Fi connection.
* Reset all data (Setup, Device settings, Reset setting, All data).
* Disassemble the printer and locate the EEPROM on the PCB.
* Create an EEPROM memory dump.
* Search and locate the configured SSID and PSK in the memory dump.



Solution:

Canon PSIRT published its security advisory "Vulnerability
Mitigation/Remediation for Inkjet Printers (Home and Office/Large
Format)" (CP2023-003)[3] describing how sensitive information should be
deleted concerning the affected printers[5].



Disclosure Timeline:

2023-04-06: Vulnerability reported to manufacturer
2023-04-12: Canon PSIRT creates ticket
2023-04-27: Update from Canon concerning ongoing analysis
2023-05-15: Canon confirms security issue
2023-05-23: Agreement on public disclosure date
2023-07-17: Canon PSIRT informs about scheduled publication of their
security advisory
2023-07-31: Canon PSIRT publishes their security advisory "Vulnerability
Mitigation/Remediation Format Inkjet Printers (Home and
Office/Large Format)" (CP2023-003)[3]
2023-08-03: Public release of SySS security advisory



References:

[1] Product website for Canon PIXMA TR4550

https://www.canon-europe.com/support/consumer/products/printers/pixma/tr-series/pixma-tr4550.html
[2] SySS Security Advisory SYSS-2023-011

https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-011.txt
[3] CP2023-003 Vulnerability Mitigation/Remediation for Inkjet Printers 
(Home and Office/Large Format)

https://psirt.canon/advisory-information/cp2023-003/
[4] List of affected printers

https://canon.a.bigcontent.io/v1/static/affected-models_20230731_d04c0d9895124b65acd21ca68357dcdc
[5] SySS Responsible Disclosure Policy
https://www.syss.de/en/responsible-disclosure-policy



Credits:

This security vulnerability was found by Manuel Stotz of SySS GmbH.

E-Mail: manuel.stotz (at) syss.de
Public Key: https://www.syss.de/fileadmin/dokumente/PGPKeys/Manuel_Stotz.asc
Key Fingerprint: F051 5B74 7E70 193E 7F66 0133 E790 F68A BCE6 8C6D



Disclaimer:

The information provided in this security advisory is provided "as is"
and without warranty of any kind. Details of this security advisory may
be updated in order to provide as accurate information as possible. The
latest