LOGO

Smart Home Security System Vulnerability | Remote Disarm

August 31, 2021
Smart Home Security System Vulnerability | Remote Disarm

Smart Home Security System Vulnerabilities Discovered

A recent report indicates that a widely used smart home security system is susceptible to a pair of security flaws. These vulnerabilities could potentially allow malicious actors to completely disable the system's protective functions.

Fortress S03 System Under Scrutiny

Rapid7, a leading cybersecurity firm, identified the vulnerabilities within the Fortress S03 system. This system utilizes Wi-Fi connectivity to integrate components like cameras, motion detectors, and sirens. Owners can remotely monitor their property via a dedicated mobile application.

The system also incorporates a radio-controlled key fob, enabling homeowners to arm or disarm the security measures from outside their residence.

Details of the Vulnerabilities

The identified weaknesses include an unauthenticated API and an unencrypted radio signal. Both of these present significant risks, as they can be readily exploited by attackers.

Rapid7 disclosed these findings publicly on Tuesday, following a three-month waiting period. This timeframe is standard practice, allowing companies an opportunity to address security concerns before public release of the details.

Lack of Response from Fortress

According to Rapid7, Fortress only acknowledged their vulnerability report by automatically closing the support ticket a week after initial contact, without providing any substantive feedback.

Attempts to reach Fortress owner Michael Hofeditz via email were unsuccessful. A legal representative from Bottone Reiling, representing Fortress, dismissed the claims as “false, purposely misleading and defamatory,” but offered no specific counterarguments or confirmation of mitigation efforts.

API Vulnerability Explained

The unauthenticated API allows remote queries without verifying the legitimacy of the request. Knowing a homeowner’s email address allows retrieval of the device’s unique IMEI. This IMEI can then be leveraged to remotely disarm the security system.

Radio Signal Weakness

The second vulnerability stems from the unencrypted radio signals transmitted between the security system and the homeowner’s key fob. Rapid7 successfully captured and replayed these signals, effectively simulating “arm” and “disarm” commands due to the lack of proper signal scrambling.

Potential Mitigations

Arvind Vishwakarma of Rapid7 suggested a temporary workaround: adding a plus-tagged email address with a complex, unique string as a substitute password. However, a permanent solution for the radio signal flaw requires action from Fortress.

Uncertain Future

Fortress has not communicated any plans to address or fix these vulnerabilities. It remains unclear whether the issues can be resolved through software updates or if hardware replacement is necessary.

Furthermore, it is unknown whether Fortress manufactures the hardware internally or sources it from a third-party supplier.

Further Reading

  • Many smart home device makers still won’t say if they give your data to the government
  • Window Snyder’s new startup Thistle Technologies raises $2.5M seed to secure IoT devices
  • Peloton’s leaky API let anyone grab riders’ private account data
  • Amazon says government demands for user data spiked by 800% in 2020
#smart home security#security system#vulnerability#remote access#hacking#cybersecurity