Stories
Slash Boxes
Comments

SoylentNews is people

posted by Fnord666 on Monday December 11 2017, @08:44AM   Printer-friendly
from the unsafe-handgun-safe dept.

Submitted via IRC for Bytram

One of Amazon's top-selling electronic gun safes contains a critical vulnerability that allows it to be opened by virtually anyone, even when they don't know the password.

The Vaultek VT20i handgun safe, ranked fourth in Amazon's gun safes and cabinets category, allows owners to electronically open the door using a Bluetooth-enabled smartphone app. The remote unlock feature is supposed to work only when someone knows the four- to eight-digit personal identification number used to lock the device. But it turns out that this PIN safeguard can be bypassed using a standard computer and a small amount of programming know-how.

As the video demonstration below shows, researchers with security firm Two Six Labs were able to open a VT20i safe in a matter of seconds by using their MacBook Pro to send specially designed Bluetooth data while it was in range. The feat required no knowledge of the unlock PIN or any advanced scanning of the vulnerable safe. The hack works reliably even when the PIN is changed. All that's required to make it work is that the safe have Bluetooth connectivity turned on.

[...] The vulnerability means that anyone who relies on a VT20i safe to secure valuables should immediately turn off Bluetooth connectivity and leave it off indefinitely. Safes can still be locked and unlocked using a traditional physical key, as well as by owners' fingerprints. Some Amazon customers, however, have complained the fingerprint feature is flawed as well.

[It's not clear from the story if the issue can be patched. - Ed]

Source: https://arstechnica.com/information-technology/2017/12/top-selling-handgun-safe-can-be-remotely-opened-in-seconds-no-pin-needed/


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 3, Insightful) by Anonymous Coward on Monday December 11 2017, @09:36AM (1 child)

    by Anonymous Coward on Monday December 11 2017, @09:36AM (#608230)

    A Safe, with a firmware update mechanism: not a safe. So this one, with promiscuous bluetooth and properly no way to hack the firmware to open the safe, which is already open, is not actually a safe, then. Let us just consider it to be a large metal box that some keep their manhood inside of. Fair enough?

    Starting Score:    0  points
    Moderation   +3  
       Insightful=2, Informative=1, Total=3
    Extra 'Insightful' Modifier   0  

    Total Score:   3  
  • (Score: 3, Insightful) by urza9814 on Monday December 11 2017, @09:27PM

    by urza9814 (3954) on Monday December 11 2017, @09:27PM (#608447) Journal

    A Safe, with a firmware update mechanism: not a safe.

    If it's an electronic safe, it's no good if it DOESN'T have a firmware update mechanism. As we can see with this example...if it's electronic, it'll probably be hacked eventually; and if you can't update it after that point then it's no longer safe.

    Of course, that firmware update mechanism must be properly secured as well. Would seem reasonable to make it only accessible from *inside* the safe...if they can access that to hack it then they already don't need to.