ID

VAR-201903-0070


CVE

CVE-2019-9860


TITLE

plural ABUS In product PRNG Inadequate entropy vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2019-003056

DESCRIPTION

Due to unencrypted signal communication and predictability of rolling codes, an attacker can "desynchronize" an ABUS Secvest wireless remote control (FUBE50014 or FUBE50015) relative to its controlled Secvest wireless alarm system FUAA50000 3.01.01, so that sent commands by the remote control are not accepted anymore. ABUSSecvestFUBE50014 and ABUSSecvestFUBE50015 are both wireless remote controls from ABUS, Germany. A security vulnerability exists in ABUSSecvestFUBE50014 and ABUSSecvestFUBE50015 that originated from program unencrypted signal communication and used a rolling code that was easily guessed. An attacker could exploit the vulnerability to cause a denial of service. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Advisory ID: SYSS-2018-036 Product: ABUS Secvest Remote Control (FUBE50014, FUBE50015) Manufacturer: ABUS Affected Version(s): n/a Tested Version(s): n/a Vulnerability Type: Denial of Service - Uncontrolled Resource Consumption (CWE-400) Risk Level: Low Solution Status: Open Manufacturer Notification: 2018-11-21 Solution Date: - Public Disclosure: 2019-03-25 CVE Reference: CVE-2019-9860 Authors of Advisory: Matthias Deeg (SySS GmbH), Thomas Detert ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Overview: ABUS Secvest FUBE50014 and FUBE50015 are wireless remote controls for the ABUS Secvest wireless alarm system. Some of the device features as described by the manufacturer are (see [1]): " * User-friendly remote control with easily identifiable symbols * Features \x91arm\x92, \x91disarm\x92 and \x91status query\x92 keys * 8 LEDs provide an overview and display current system status * Button for custom configuration available (Secvest wireless alarm system only) * Optional manual panic alarm available (Secvest wireless alarm system only) * Encrypted signal transmission * Rolling Code Thanks to the rolling code process this product is protected against so-called replay attacks. All controlling signals between this product and the Secvest alarm panel are in individualised and thus, are not able to be reproduced by third parties. This process is protected from third party tampering, and exceeds the requirements of the DIN EN 50131-1 level 2 security standard. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Proof of Concept (PoC): Thomas Detert developed a Teensy-based PoC tool using a CC1101 sub-1GHz transceiver that allows disarming the alarm system in an unauthorized way. He provided his tool including documentation and source to SySS GmbH for responsible disclosure purposes. Based on Mr. Detert's PoC tool, SySS GmbH developed a Python tool for the RFCat-based radio dongle YARD Stick One (see [4]) for demonstrating this simple denial-of-service (DoS) attack against the ABUS Secvest wireless remote controls FUBE50014 and FUBE50015. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution: SySS GmbH is not aware of a solution for this reported security vulnerability. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Disclosure Timeline: 2018-11-21: Vulnerability reported to manufacturer 2018-11-28: Vulnerability reported to manufacturer once more 2018-12-12: E-mail to ABUS support asking if they are going to give some feedback regarding the reported security issue 2018-12-12: Phone call with ABUS support, the reported security advisories were forwarded to the ABUS Security Center Support 2018-12-12: E-mail to ABUS Security Center Support asking if they are going to give some feedback regarding the reported security issue 2019-01-14: Updated information regarding remote control ABUS Secvest FUBE50015 2019-03-25: Public release of security advisory ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ References: [1] Product website for ABUS Secvest wireless remote control https://www.abus.com/eng/Home-Security/Alarm-systems/Secvest-wireless-alarm-system/Control-devices-and-extensions/Secvest-Wireless-Remote-Control2 [2] SySS Security Advisory SYSS-2018-035 https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-035.txt [3] SySS Security Advisory SYSS-2018-034 https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-034.txt [4] Product website YARD Stick One https://greatscottgadgets.com/yardstickone/ [5] SySS Security Advisory SYSS-2018-036 https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-036.txt [6] SySS GmbH, SySS Responsible Disclosure Policy https://www.syss.de/en/news/responsible-disclosure-policy/ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Credits: This security vulnerability was found by Thomas Detert. Mr. Detert reported his finding to SySS GmbH where it was verified and later reported to the manufacturer by Matthias Deeg. E-Mail: matthias.deeg (at) syss.de Public Key: https://www.syss.de/fileadmin/dokumente/Materialien/PGPKeys/Matthias_Deeg.asc Key fingerprint = D1F0 A035 F06C E675 CDB9 0514 D9A4 BF6A 34AD 4DAB ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Disclaimer: The information provided in this security advisory is provided "as is" and without warranty of any kind. Details of this security advisory may be updated in order to provide as accurate information as possible. The latest version of this security advisory is available on the SySS Web site. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Copyright: Creative Commons - Attribution (by) - Version 3.0 URL: http://creativecommons.org/licenses/by/3.0/deed.en -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEE0fCgNfBs5nXNuQUU2aS/ajStTasFAlyUoMMACgkQ2aS/ajSt TatXPw/8CKe79eTckW/tXs4iIXP3hRTwy3+doB5r92txbd5OkayGRvfY6nGLX+LB naael/ZimlLq6QfNZsMiFli1+L9PS3IB52Suo2w7thHcTvz+fPJVfMt0fTkeGTvX mTfm8/ZsQ1vH0uU2EccwL5aVatiVHzuowJd6yv9afWBQ+ci8fShFmm7FGgfeCWoP Z3iOfttXlpPNMUsk9gMum+UeyqBsGSj0KjJxy3Cuugz783IPB+hdDWLPigmdtZPO chO7jEC6JXQJXt5UK/F8CdSZ1xF1NhfpQ9NvzvIBeEMy7V19S3EUnsow88i8HOSL pkRtISvp98QHfomJMCUUXRe6DSnXFyVy416zgw753610vCvlVH9pgKZ2JlyHragA YKSbadah2qqmYOm6Z7NMuXVNA+TqNh70u14IOl1bdr+Gp1nbvdcORMdU0aoBZfO+ KdyVBbeZgOQ9jOFs8dZzzMCuCx3eMsby4Ynwwnuu/YS4j1fwaK6l+G+nOEHLzc+J U2txKilfISr3kupFj/UBYzd7AjHul7C7Uu8LzI/HcAWSlv/zwtc0PiluAjFV1C7x pyaICS9AISt4YzNXUyH/bm2NkehxXz6lMnvJ4j8jvJJbdbvlgyhnKXovZMzRlN8Y 0WLRQtlTx/zYjZyD+qw5/L53qx3An0OYBVLLYFduU9FgZbgnbnM= =Zb9J -----END PGP SIGNATURE-----

Trust: 2.34

sources: NVD: CVE-2019-9860 // JVNDB: JVNDB-2019-003056 // CNVD: CNVD-2019-08179 // VULHUB: VHN-161295 // PACKETSTORM: 152218

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2019-08179

AFFECTED PRODUCTS

vendor:abusmodel:secvest wireless alarm system fuaa50000scope:eqversion:3.01.01

Trust: 1.8

vendor:abusmodel:secvest wireless remote control fube50015scope:eqversion: -

Trust: 1.0

vendor:abusmodel:secvest wireless remote control fube50014scope:eqversion: -

Trust: 1.0

vendor:abusmodel:secvest wireless remote control fube50014scope: - version: -

Trust: 0.8

vendor:abusmodel:secvest wireless remote control fube50015scope: - version: -

Trust: 0.8

vendor:abusmodel:secvest fube50014scope: - version: -

Trust: 0.6

vendor:abusmodel:secvest fube50015scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2019-08179 // JVNDB: JVNDB-2019-003056 // NVD: CVE-2019-9860

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-9860
value: HIGH

Trust: 1.0

NVD: CVE-2019-9860
value: HIGH

Trust: 0.8

CNVD: CNVD-2019-08179
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201903-929
value: HIGH

Trust: 0.6

VULHUB: VHN-161295
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2019-9860
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2019-08179
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-161295
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-9860
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2019-08179 // VULHUB: VHN-161295 // JVNDB: JVNDB-2019-003056 // CNNVD: CNNVD-201903-929 // NVD: CVE-2019-9860

PROBLEMTYPE DATA

problemtype:CWE-319

Trust: 1.0

problemtype:CWE-330

Trust: 1.0

problemtype:CWE-332

Trust: 0.9

sources: VULHUB: VHN-161295 // JVNDB: JVNDB-2019-003056 // NVD: CVE-2019-9860

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 152218 // CNNVD: CNNVD-201903-929

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201903-929

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-003056

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-161295

PATCH

title:Top Pageurl:https://www.abus.com/

Trust: 0.8

sources: JVNDB: JVNDB-2019-003056

EXTERNAL IDS

db:NVDid:CVE-2019-9860

Trust: 3.2

db:PACKETSTORMid:152218

Trust: 1.4

db:JVNDBid:JVNDB-2019-003056

Trust: 0.8

db:CNNVDid:CNNVD-201903-929

Trust: 0.7

db:CNVDid:CNVD-2019-08179

Trust: 0.6

db:VULHUBid:VHN-161295

Trust: 0.1

sources: CNVD: CNVD-2019-08179 // VULHUB: VHN-161295 // JVNDB: JVNDB-2019-003056 // PACKETSTORM: 152218 // CNNVD: CNNVD-201903-929 // NVD: CVE-2019-9860

REFERENCES

url:https://www.syss.de/fileadmin/dokumente/publikationen/advisories/syss-2018-036.txt

Trust: 2.6

url:https://nvd.nist.gov/vuln/detail/cve-2019-9860

Trust: 1.5

url:https://packetstormsecurity.com/files/152218/abus-secvest-remote-control-denial-of-service.html

Trust: 1.2

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-9860

Trust: 0.8

url:http://seclists.org/bugtraq/2019/mar/39

Trust: 0.6

url:http://creativecommons.org/licenses/by/3.0/deed.en

Trust: 0.1

url:https://www.abus.com/eng/home-security/alarm-systems/secvest-wireless-alarm-system/control-devices-and-extensions/secvest-wireless-remote-control2

Trust: 0.1

url:https://www.syss.de/fileadmin/dokumente/publikationen/advisories/syss-2018-034.txt

Trust: 0.1

url:https://www.syss.de/en/news/responsible-disclosure-policy/

Trust: 0.1

url:https://www.syss.de/fileadmin/dokumente/publikationen/advisories/syss-2018-035.txt

Trust: 0.1

url:https://www.syss.de/fileadmin/dokumente/materialien/pgpkeys/matthias_deeg.asc

Trust: 0.1

url:https://greatscottgadgets.com/yardstickone/

Trust: 0.1

sources: CNVD: CNVD-2019-08179 // VULHUB: VHN-161295 // JVNDB: JVNDB-2019-003056 // PACKETSTORM: 152218 // CNNVD: CNNVD-201903-929 // NVD: CVE-2019-9860

CREDITS

Matthias Deeg

Trust: 0.6

sources: CNNVD: CNNVD-201903-929

SOURCES

db:CNVDid:CNVD-2019-08179
db:VULHUBid:VHN-161295
db:JVNDBid:JVNDB-2019-003056
db:PACKETSTORMid:152218
db:CNNVDid:CNNVD-201903-929
db:NVDid:CVE-2019-9860

LAST UPDATE DATE

2024-11-23T22:48:29.379000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2019-08179date:2019-04-01T00:00:00
db:VULHUBid:VHN-161295date:2019-04-02T00:00:00
db:JVNDBid:JVNDB-2019-003056date:2019-05-08T00:00:00
db:CNNVDid:CNNVD-201903-929date:2019-04-03T00:00:00
db:NVDid:CVE-2019-9860date:2024-11-21T04:52:27.370

SOURCES RELEASE DATE

db:CNVDid:CNVD-2019-08179date:2019-03-26T00:00:00
db:VULHUBid:VHN-161295date:2019-03-27T00:00:00
db:JVNDBid:JVNDB-2019-003056date:2019-05-08T00:00:00
db:PACKETSTORMid:152218date:2019-03-25T16:09:02
db:CNNVDid:CNNVD-201903-929date:2019-03-25T00:00:00
db:NVDid:CVE-2019-9860date:2019-03-27T15:29:01.127