Navigation
Recherche
|
Crickets From Chirp Systems in Smart Lock Key Leak
lundi 15 avril 2024, 22:50 , par Slashdot
The U.S. government is warning that smart locks securing entry to an estimated 50,000 dwellings nationwide contain hard-coded credentials that can be used to remotely open any of the locks. Krebs on SecurityL: The lock's maker Chirp Systems remains unresponsive, even though it was first notified about the critical weakness in March 2021. Meanwhile, Chirp's parent company, RealPage, Inc., is being sued by multiple U.S. states for allegedly colluding with landlords to illegally raise rents. On March 7, 2024, the U.S. Cybersecurity & Infrastructure Security Agency (CISA) warned about a remotely exploitable vulnerability with 'low attack complexity' in Chirp Systems smart locks.
'Chirp Access improperly stores credentials within its source code, potentially exposing sensitive information to unauthorized access,' CISA's alert warned, assigning the bug a CVSS (badness) rating of 9.1 (out of a possible 10). 'Chirp Systems has not responded to requests to work with CISA to mitigate this vulnerability.' Matt Brown, the researcher CISA credits with reporting the flaw, is a senior systems development engineer at Amazon Web Services. Brown said he discovered the weakness and reported it to Chirp in March 2021, after the company that manages his apartment building started using Chirp smart locks and told everyone to install Chirp's app to get in and out of their apartments. Read more of this story at Slashdot.
https://it.slashdot.org/story/24/04/15/1826215/crickets-from-chirp-systems-in-smart-lock-key-leak?ut...
|
56 sources (32 en français)
Date Actuelle
mer. 27 nov. - 21:22 CET
|