TechCrunch News 02月24日
A single default password exposes access to dozens of apartment buildings
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

安全研究人员发现,一款广泛使用的门禁系统存在默认密码漏洞,使得攻击者可以远程访问美国和加拿大数十栋建筑的门锁和电梯控制系统。尽管研究人员已将此漏洞报告给Hirsch公司,但该公司拒绝修复,声称这是设计使然,并指责客户未遵循安装说明更改默认密码。这意味着北美地区仍有大量建筑暴露在风险之中,因为它们尚未更改默认密码,或者根本不知道需要更改。

🔑 **默认密码风险**: Hirsch公司的Enterphone MESH门禁系统使用默认密码,且安装过程中未强制用户更改,导致系统存在严重的安全漏洞,被正式命名为CVE-2025-26793。

🏢 **漏洞利用简易**: 利用该漏洞非常简单,只需从Hirsch网站的安装指南中获取默认密码,并将其输入到受影响建筑系统的互联网登录页面即可轻松入侵。

🌐 **大规模暴露**: 通过互联网扫描,研究人员发现了71个仍在使用默认密码的Enterphone MESH系统,这些系统允许访问电梯、公共区域以及办公室和住宅门锁的管理。

⚠️ **厂商态度消极**: Hirsch公司认为使用默认密码是“过时的”,但拒绝公开漏洞细节,也未采取有效措施解决问题,使得大量建筑及其居住者仍面临安全风险。

A security researcher says the default password shipped in a widely used door access control system allows anyone to easily and remotely access door locks and elevator controls in dozens of buildings across the U.S. and Canada.

Hirsch, the company that now owns the Enterphone MESH door access system, won’t fix the vulnerability, saying that the bug is by design and that customers should have followed the company’s setup instructions and changed the default password. 

That leaves dozens of exposed buildings across North America that have not yet changed their access control system’s default password or are unaware that they should, according to Eric Daigle, who found the dozens of exposed buildings.

Default passwords are not uncommon nor necessarily a secret in internet-connected devices; passwords shipped with products are typically designed to simplify login access for the customer and are often found in their instruction manual. But relying on a customer to change a default password to prevent any future malicious access still classifies as a security vulnerability within the product itself.

In the case of Hirsch’s door entry products, customers installing the system are not prompted or required to change the default password.

As such, Daigle was credited with the discovery of the security bug, formally designated as CVE-2025-26793.

Default passwords have long been a problem for internet-connected devices, allowing malicious hackers to use the passwords to log in as if they were the rightful owner and steal data, or hijack the devices to harness their bandwidth for launching cyberattacks. In recent years, governments have sought to nudge technology makers away from using insecure default passwords given the security risks they present.

In the case of Hirsch’s door entry system, the bug is rated as a 10 out of 10 on the vulnerability severity scale, thanks to the ease with which anyone can exploit it. Practically speaking, exploiting the bug is as simple as taking the default password from the system’s installation guide on Hirsch’s website and plugging the password into the internet-facing login page on any affected building’s system.

In a blog post, Daigle said he found the vulnerability last year after discovering one of the Hirsch-made Enterphone MESH door entry panels on a building in his hometown of Vancouver. Daigle used internet scanning site ZoomEye to look for Enterphone MESH systems that were connected to the internet, and found 71 systems that still relied on the default-shipped credentials.

Daigle said the default password allows access to MESH’s web-based backend system, which building managers use to manage access to elevators, common areas, and office and residential door locks. Each system displays the physical address of the building with the MESH system installed, allowing anyone logging in to know which building they had access to.

Daigle said it was possible to effectively break into any of the dozens of affected buildings in minutes without attracting any attention. 

TechCrunch intervened because Hirsch does not have the means, such as a vulnerability disclosure page, for members of the public like Daigle to report a security flaw to the company. 

Hirsch CEO Mark Allen did not respond to TechCrunch’s request for comment but instead deferred to a senior Hirsch product manager, who told TechCrunch that the company’s use of default passwords is “outdated” (without saying how). The product manager said it was “equally concerning” that there are customers that “installed systems and are not following the manufacturers’ recommendations,” referring to Hirsch’s own installation instructions.

Hirsch would not commit to publicly disclosing details about the bug, but said it had contacted its customers about following the product’s instruction manual.

With Hirsch unwilling to fix the bug, some buildings — and their occupants — are likely to remain exposed. The bug shows that product development choices from yesteryear can come back to have real-world implications years later.

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

门禁系统 默认密码 安全漏洞 Hirsch 网络安全
相关文章