CERT Recently Published Vulnerability Notes 2024年07月06日
VU#949046: Sceiner firmware locks and associated devices are vulnerable to encryption downgrade and arbitrary file upload attacks
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

Sciener 公司开发的智能锁固件存在多个安全漏洞,影响使用 Sciener 固件的多种品牌智能锁。这些漏洞可能导致攻击者通过蓝牙或网络连接获取解锁密钥,并控制锁的开关状态,甚至刷入恶意固件。受影响的设备包括 Kontrol Lux 锁、Gateway G2 和 TTLock 应用程序,建议用户及时更新固件和应用程序,并注意安全防护。

😔 **解锁密钥暴力破解:** Sciener 固件中的解锁密钥可以通过重复的挑战请求进行暴力破解。攻击者可以反复发送挑战请求,尝试不同的随机数,直到找到正确的解锁密钥,从而获得锁的控制权。

🤨 **加密协议降级:** 攻击者可以向 TTLock 应用程序发送特制的恶意消息,导致通信加密协议降级,从而获取解锁密钥和其他敏感信息。

🔐 **密钥重用漏洞:** Sciener 固件中使用的 AES 密钥在配对过程中没有进行唯一性校验,导致攻击者可以利用同一个密钥连接到其他支持无线键盘的 Sciener 锁。

👻 **虚拟密钥删除漏洞:** TTLock 应用程序支持创建虚拟密钥,但这些密钥的删除只在客户端进行,攻击者可以通过获取已删除的虚拟密钥来解锁锁。

🤖 **身份验证漏洞:** TTLock 应用程序没有对连接设备进行严格的身份验证,攻击者可以伪造锁的 MAC 地址,欺骗应用程序,从而获取解锁密钥。

📡 **服务器身份验证漏洞:** Sciener 服务器没有对 GatewayG2 的连接请求进行验证,攻击者可以伪造 GatewayG2 的 MAC 地址,连接到服务器,获取锁的控制权。

🌐 **明文通信漏洞:** 一些基于 Sciener 固件的锁支持通过蓝牙低功耗进行明文通信,攻击者可以发送恶意命令,控制锁的开关状态。

🔨 **固件更新漏洞:** 一些 Sciener 锁的固件更新机制没有进行身份验证,攻击者可以通过蓝牙连接发送恶意固件,控制锁的开关状态。

😥 **影响:** 这些漏洞可能导致攻击者在无需用户知情的情况下,通过蓝牙或网络连接获取锁的控制权,从而造成财产损失和安全风险。

Overview

Sciener is a company that develops software and hardware for electronic locks that are marketed under many different brands. Their hardware works in tandem with an app, called the TTLock app, which is also produced by Sciener. The TTLock app utilizes Bluetooth connections to connect to locks that utilize the Sciener firmware, and allows for manipulation of the lock. Sceiner firmware locks also supports peripherals. The GatewayG2, also produced by Sciener, allows for connection to an appropriate lock through the TTLock app through WiFi. Sciener firmware also allows wireless keypad connection to supported devices.

Analysis has revealed that various locks are vulnerable through the Sciener firmware. Additional vulnerabilities within the TTLock App and GatewayG2 can be further utilized to compromise the associated electronic lock integrity, and affect any locks that utilize them.

A number of these vulnerabilities are facilitated through the unlockKey character. The unlockKey character, when provided to the appropriate lock, can be used to unlock or lock the device.

Description

The vulnerabilities are as follows:

• CVE-2023-7006

The unlockKey character in a lock using Sciener firmware can be brute forced through repeated challenge requests, compromising the locks integrity. Challenge requests take place during the unlocking process, and contain a random integer between 0 and 65535. Challenge requests can be repeatedly prompted and responded to without any limitations, until the correct integer is discovered. Successfully completing the challenge request provides the unlockKey character.

• CVE-2023-7005

A specially crafted message can be sent to the TTLock App that downgrades the encryption protocol used for communication and can be utilized to compromise the lock, such as by providing the unlockKey character. During the challenge request process, if a message is sent to the lock unencrypted, and with a specific set of information, the corresponding message that contains the unlockKey character will be provided unencrypted.

• CVE-2023-7003

The AES key utilized in the pairing process between a lock using Sciener firmware and a wireless keypad is not unique, and can be reused compromise other locks using the Sciener firmware. This AES key can be utilized to connect to any other Sciener lock that supports wireless keypads, without user knowledge or interaction.

• CVE-2023-6960

The TTLock App supports the creation of virtual keys and settings. They virtual keys are intended to be distributed to other individuals through the TTLock app, for unlocking and locking the lock. They can also be set to only be valid for a certain period of time. Deletion of these keys only occurs client side in the TTLock app, with the appropriate key information persisting within the associated lock. If an attacker acquires one of these keys, they can utilize it to unlock the lock after its intended deletion or invalidation.

• CVE-2023-7004

The TTLock App does not employ proper verification procedures to ensure that it is communicating with the expected device. This can be utilized by a threat actor who introduces a device that spoofs the MAC address of the lock, allowing for compromise of the unlockKey value.

• CVE-2023-7007

The Sciener server does not validate connection requests from the GatewayG2, allowing an impersonation attack. An attacker can impersonate the MAC address of a GatewayG2 that has established a connection with a lock, then connect to Sciener servers and receive messages instead of the legitimate GatewayG2. This can facilitate access of the unlockKey character.

• CVE-2023-7009

Some Sciener-based locks support plaintext message processing over Bluetooth Low Energy, allowing unencrypted malicious commands to be passed to the lock. These malicious commands, less then 16 bytes in length, will be processed by the lock as if they were encrypted communications. This can be further exploited by an attacker to compromise the lock's integrity.

• CVE-2023-7017

Some Sciener locks' firmware update mechanism does not authenticate or validate firmware updates if passed to the lock through the Bluetooth Low Energy service. A challenge request can be sent to the lock with a command to prepare for an update, rather than an unlock request. This allows an attacker within Bluetooth range to pass an arbitrary malicious firmware to the lock, compromising its integrity.

Impact

These vulnerabilities allow attackers with physical, adjacent, or Bluetooth connection proximity to the lock access of various capabilities to compromise the lock integrity, without victim knowledge or interaction. This results in the locks functionality being null.

Affected versions:

    Kontrol Lux lock, firmware versions 6.5.x to 6.5.07Gateway G2, firmware version 6.0.0TTLock App, version 6.4.5

Solution

There is no software solution for these vulnerabilities, only a potential work-around. By disabling various functions related to the Bluetooth capability of locks using Sciener firmware, several of the attacks can be prevented. However, as the locks are designed with the intention of utilization with the TTLock App, this may not be a practical solution for most users.

Acknowledgements

Thanks to Lev Aronsky, Idan Strovinsky, and Tomer Telem of Aleph Research by HCL Software for providing the report and information. This document was written by Christopher Cullen.

Vendor Information

One or more vendors are listed for this advisory. Please reference the full report for more information.

Other Information

CVE IDs: CVE-2023-7004 CVE-2023-7005 CVE-2023-7006 CVE-2023-7017 CVE-2023-7009 CVE-2023-7007 CVE-2023-7003 CVE-2023-6960
Date Public: 2024-03-07
Date First Published: 2024-03-07
Date Last Updated: 2024-03-18 16:40 UTC
Document Revision: 3

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

Sciener 智能锁 安全漏洞 蓝牙 网络安全 TTLock
相关文章