exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

iStar Ultra / IP-ACM Boards Fixed AES Key

iStar Ultra / IP-ACM Boards Fixed AES Key
Posted Dec 20, 2017
Authored by David Tomaschik

Vulnerabilities were identified in the iStar Ultra and IP-ACM boards offered by Software House. The communications between the IP-ACM and the iStar Ultra is encrypted using a fixed AES key and IV. Each message is encrypted in CBC mode and restarts with the fixed IV, leading to replay attacks of entire messages. There is no authentication of messages beyond the use of the fixed AES key, so message forgery is also possible.

tags | advisory, vulnerability, bypass
advisories | CVE-2017-17704
SHA-256 | 204786b1402fdbec34ba89ae4fe9ceed678dd3d6096ef0880cd0a2f1ff6cb00d

iStar Ultra / IP-ACM Boards Fixed AES Key

Change Mirror Download
Introduction
------------
Vulnerabilities were identified in the iStar Ultra & IP-ACM boards offered
by Software House. This system is used to control physical access to
resources based on RFID-based badge readers. Badge readers interface with
the IP-ACM board, which uses TCP/IP to communicate with the iStar Ultra
controller.

These were discovered during a black box assessment and therefore the
vulnerability list should not be considered exhaustive; observations
suggest that it is likely that further vulnerabilities exist. It is
strongly recommended that Software House undertake a full whitebox security
assessment of this application. Additionally, it is our suggestion that
all communications be conducted over TLS. While alternatives are suggested
below, cryptography is very difficult even for experts, and so using a
well-understood cryptosystem like TLS is preferable to home-grown
solutions. The version under test was indicated as: 6.5.2.20569. As of the
time of disclosure, the issues remain unfixed.

Issues Found
------------
The communications between the IP-ACM and the iStar Ultra is encrypted
using a fixed AES key and IV. Each message is encrypted in CBC mode and
restarts with the fixed IV, leading to replay attacks of entire messages.
There is no authentication of messages beyond the use of the fixed AES key,
so message forgery is also possible. A working proof of concept has been
demonstrated that allows an attacker with access to the IP network used by
the IP-ACM and iStar Ultra to unlock doors connected to the IP-ACM. (This
PoC will not be disclosed at this time, due to the issue remaining unfixed.)

Impact & Workaround
-------------------
An attacker with access to the network can unlock doors without generating
any log entry of the door unlock. An attacker can also prevent legitimate
unlock attempts. Organizations using these devices should ensure that the
network used for IP-ACM to iStar Ultra communications is not accessible to
potential attackers.

Timeline
--------
* 2017/07/01-2017/07/14 - Issues discovered
* 2017/07/19 - Issues disclosed to Software House
* 2017/08/29 - Issues acknowledged & proposed fixes discussed. Informed
that current hardware could not be fixed and fixes would only apply to new
products.
* 2017/10/19 - 90 day window elapsed in accordance with disclosure policy.
* 2017/12/18 - Public disclosure.

Credit
------
These issues were discovered by David Tomaschik of the Google Security Team.


--
David Tomaschik
Security Engineer
ISA Assessments Team
Google, Inc.


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close