Article Details
Scrape Timestamp (UTC): 2024-08-22 16:51:59.210
Source: https://thehackernews.com/2024/08/hardware-backdoor-discovered-in-rfid.html
Original Article Text
Click to Toggle View
Hardware Backdoor Discovered in RFID Cards Used in Hotels and Offices Worldwide. Cybersecurity researchers have uncovered a hardware backdoor within a particular model of MIFARE Classic contactless cards that could allow authentication with an unknown key and open hotel rooms and office doors. The attacks have been demonstrated against FM11RF08S, a new variant of MIFARE Classic that was released by Shanghai Fudan Microelectronics in 2020. "The FM11RF08S backdoor enables any entity with knowledge of it to compromise all user-defined keys on these cards, even when fully diversified, simply by accessing the card for a few minutes," Quarkslab researcher Philippe Teuwen said. The secret key is not only common to existing FM11RF08S cards, the investigation found that "the attacks could be executed instantaneously by an entity in a position to carry out a supply chain attack." Compounding matters further, a similar backdoor has been identified in the previous generation, FM11RF08, that's protected with another key. The backdoor has been observed in cards dating back to November 2007. An optimized version of the attack could speed up the process of cracking a key by five to six times by partially reverse engineering the nonce generation mechanism. "The backdoor [...] allows the instantaneous cloning of RFID smart cards used to open office doors and hotel rooms around the world," the company said in a statement. "Although the backdoor requires just a few minutes of physical proximity to an affected card to conduct an attack, an attacker in a position to carry out a supply chain attack could execute such attacks instantaneously at scale." Consumers are urged to check if they are susceptible, especially in light of the fact that these cards are used widely in hotels across the U.S., Europe, and India. The backdoor and its key "allows us to launch new attacks to dump and clone these cards, even if all their keys are properly diversified," Teuwen noted. This is not the first time security issues have been unearthed in locking systems used in hotels. Earlier this March, Dormakaba's Saflok electronic RFID locks were found to harbor severe shortcomings that could be weaponized by threat actors to forge keycards and unlock doors.
Daily Brief Summary
Cybersecurity experts have identified a hardware backdoor in FM11RF08S and the older FM11RF08 RFID cards used in hotel and office access systems worldwide.
The vulnerability allows unauthorized access to buildings by exploiting a universal secret key embedded in the cards.
The flaw, stemming from Shanghai Fudan Microelectronics' design, enables attackers to instantaneously clone RFID cards, significantly compromising security.
These cards have been in circulation since at least November 2007, increasing the potential impact of the vulnerability.
Attack techniques have been refined to expedite the process of key cracking by five to six times, enhancing the feasibility of attacks.
The issue not only affects consumers directly but also poses a significant risk for hotels and offices in the U.S., Europe, and India that broadly use these access systems.
The research also mentions previous incidents, such as the vulnerabilities found in Dormakaba’s hotel door locking systems, emphasizing ongoing security challenges in RFID technologies.