This top home security system could be disabled remotely

Collapse
X
 
  • Time
  • Show
Clear All
new posts
  • PCHF IT Feeds
    PCHF Bot
    • Jan 2015
    • 54580

    #1

    This top home security system could be disabled remotely

    A popular home security system can reportedly be disabled, according to cybersecurity researchers.

    Researchers at Rapid7 found a pair of vulnerabilities in the Fortress S03 home security system that relies on Wi-Fi to connect cameras, motion sensors and sirens to the internet, to enable owners to remotely monitor their home.

    Rapid7 has shared the details about the two vulnerabilities after it did not hear from Fortress in over three months, which is the standard window of time for security disclosures, followed by the industry.

    TechRadar needs you!
    We’re looking at how our readers use VPNs with streaming sites like Netflix so we can improve our content and offer better advice. This survey won’t take more than 60 seconds of your time, and we’d hugely appreciate if you’d share your experiences with us.
    Click here to start the survey in a new window p>
    [ul]
    [li]Here’s our collection of the best business security systems[/li][li]Also take a look at these best home security cameras[/li][li]And these are the best home video surveillance systems[/li][/ul]
    According to the timeline shared by Rapid7, it is confident it got through to the company since Fortress silently closed its first support ticket over a week later after it was created.

    [HEADING=1]Anybody home?[/HEADING]

    As per the details shared by Rapid7, it found that the Fortress S03 system relies on a radio-controlled key fob that helps arm and disarm the system.

    Its researchers discovered that signals from the keys were unencrypted and could be intercepted, which enabled them to capture and replay the signals for “arm” and “disarm”.

    It found a second vulnerability in Fortress’ unauthenticated API, which can be remotely queried over the internet without the server checking the legitimacy of the request. All it takes is a homeowner’s email address for the server to return the device’s unique IMEI code, which can be used to remotely disarm the system.

    Rapid7 claims it brought the issues to Fortress’ knowledge, but the company never returned their messages, even after it raised a new ticket reiterating their intent to publish the details.

    While Fortress did not respond to queries from TechCrunch, an email from their law firm labelled Rapid7’s claims as “false, purposely misleading and defamatory,” without adding more details.

    [ul]
    [li]These are the best endpoint protection tools[/li][/ul]

    Via TechCrunch

    Continue reading…
Working...