34C3 - Uncovering vulnerabilities in Hoermann BiSecur

Title:
34C3 - Uncovering vulnerabilities in Hoermann BiSecur
Description:

https://media.ccc.de/v/34c3-9029-uncovering_vulnerabilities_in_hoermann_bisecur

An AES encrypted radio system

Hoermann BiSecur is a bi-directional wireless access control system “for the convenient and secure operation of garage and entrance gate operators, door operators, lights […]” and smart home devices. The radio signal is AES-128 encrypted and the system is marketed to be “as secure as online banking”. In comparison to conventional and often trivial to break wireless access control systems, the system should thus make it practically infeasible to clone a genuine transmitter so that attackers can get unauthorized access. We used the low-cost CCC rad1o software defined radio (SDR) platform to intercept and analyze the wireless radio signal. We took apart several Hoermann BiSecur hand transmitters and subsequently utilized a vulnerability in the microcontroller to successfully extract the firmware. In order to conduct a security audit, the extracted firmware was disassembled and analyzed so that the encryption mechanism, the key material, the cryptographic operations as well as the RF interface could be reverse engineered. Our security analysis shows that the overall security design is sound, but the manufacturer failed to properly initialize the random seed of the transmitters. As a result, an attacker can intercept an arbitrary radio frame and trivially compute the utilized encryption key within less than a second. Once the key is known to the attacker, a genuine transmitter can be cloned with an SDR platform such as the CCC rad1o. In addition to unauthorized operation of gates and doors, there is a likely (although currently untested) impact on Smart Home appliances that use the BiSecur system. We tested a total of 7 hand transmitters from 3 different model series and with manufacturing dates between 2015 and 2017. All analyzed hand transmitters shared the same static random seed and were found to be vulnerable to our attack. The vulnerability can easily be fixed so that future hand transmitters and radio transmission are protected from our attack.

In our CCC talk we plan to give a step-by-step presentation on how we analyzed and subsequently broke the Hoermann BiSecur system. This includes the following topics:
- Overall system overview
- Radio signal analysis with the CCC rad1o SDR platform
- Reverse engineering of the radio signal
- Hardware analysis of BiSecur transmitters
- Firmware extraction from the microcontroller by exploiting a security flaw in the PIC18F controller
- Firmware disassembly and reverse engineering with IDA Pro
- Analysis results providing a technical overview of how the BiSecur system operates including the encryption scheme (with AES-128 at its core) and RF operations
- Presentation of our attacks (signal cloning of genuine transmitters)
- Live-Hacking Demo with the CCC rad1o SDR platform
- Suggested security fix

Markus Muellner Markus Kammerstetter

https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9029.html

more » « less
Video Language:
English
Duration:
51:36
http://www.youtube.com/watch?v=vPhaTZK2e8w
Format: Youtube
Primary
Original
Added   by C3Subtitles
Format: Youtube
Primary
Original
http://www.youtube.com/watch?v=6aO1gGOQNq8
Format: Youtube
Added   by C3Subtitles
Format: Youtube
This video is part of Amara Public.

Subtitles download

Incomplete subtitles (1)