Story image

Electronic lock vulnerabilities can lead attackers directly to your hotel room

30 Apr 2018

Next time you stay at a hotel as part of a business or personal trip, you may want to ask if the hotel’s locking systems are up-to-date.

Researchers at F-Secure discovered that hotels throughout the world use an electronic lock system that an attacker can exploit to gain access to any room in the building.

The vulnerabilities lie in the Vision by VingCard lock system software, which is used to secure millions of hotel rooms across the globe.

Researchers demonstrated that any ordinary key can be used to target the hotel – including keys that have been thrown away, expired, or ones to use spaces such as garages.

They were able to create a master key with privileges to open any room in the building, which can then be used to conduct a completely unnoticeable attack.

“You can imagine what a malicious person could do with the power to enter any hotel room, with a master key created basically out of thin air,” comments F-Secure Cyber Security Services practice leader Tomi Tuominen.

“We don’t know of anyone else performing this particular attack in the wild right now.”

The researchers decided to investigate the topic when a colleague’s laptop was stolen from a hotel room during a security conference 10 years ago.

Researchers say that when they reported the theft, hotel staff dismissed the complaint because they couldn’t find evidence of forced entry, or any evidence of unauthorised access in the room entry logs.

The researchers decided to investigate the issue further, and chose to target a brand of lock known for quality and security. These security oversights were not obvious holes, they add.

It took a thorough understanding of the whole system’s design to identify small flaws that, when combined, produced the attack. The research took several thousand hours and was done on an on-and-off basis, and involved considerable amounts of trial and error.

“We wanted to find out if it’s possible to bypass the electronic lock without leaving a trace,” comments F-Secure senior security consultant Timo Hirvonen.

“Building a secure access control system is very difficult because there are so many things you need to get right. Only after we thoroughly understood how it was designed were we able to identify seemingly innocuous shortcomings. We creatively combined these shortcomings to come up with a method for creating master keys.”

Assa Abloy, the world’s largest lock manufacturer, has issued software updates with security fixes to mitigate the vulnerabilities.

“I would like to personally thank the Assa Abloy R&D team for their excellent cooperation in rectifying these issues,” says Tuominen.

“Because of their diligence and willingness to address the problems identified by our research, the hospitality world is now a safer place. We urge any establishment using this software to apply the update as soon as possible.”

Thycotic debunks top Privileged Access Management myths
Privileged Access encompasses access to computers, networks and network devices, software applications, digital documents and other digital assets.
Veeam reports double-digit Q1 growth
We are now focussed on an aggressive strategy to help businesses transition to cloud with Backup and Cloud Data Management solutions.
Paving the road to self-sovereign identity using blockchain
Internet users are often required to input personal information and highly-valuable data from contact numbers to email addresses to make use of the various platforms and services available online.
Tech Data to distribute Nutanix backup solution in A/NZ
Tech Data will distribute HYCU Data Protection for Nutanix backup and recovery software to their network of partners across Australia and New Zealand.
Veeam releases v3 of its MS Office backup solution
One of Veeam’s most popular solutions, Backup for Office 365, has been upgraded again with greater speed, security and analytics.
Too many 'critical' vulnerabilities to patch? Tenable opts for a different approach
Tenable is hedging all of its security bets on the power of predictive, as the company announced general available of its Predictive Prioritisation solution within Tenable.io.
Safety solutions startup wins ‘radical generosity’ funding
Guardian Angel Security was one of five New Zealand businesses selected by 500 women (SheEO Activators) who contributed $1100 each.
Industrial control component vulnerabilities up 30%
Positive Technologies says exploitation of these vulnerabilities could disturb operations by disrupting command transfer between components.