ID

VAR-202006-0224


CVE

CVE-2020-14157


TITLE

ABUS Secvest FUBE50001 Information Disclosure Vulnerability

Trust: 1.2

sources: CNVD: CNVD-2021-20276 // CNNVD: CNNVD-202006-1196

DESCRIPTION

The wireless-communication feature of the ABUS Secvest FUBE50001 device does not encrypt sensitive data such as PIN codes or IDs of used proximity chip keys (RFID tokens). This makes it easier for an attacker to disarm the wireless alarm system. ABUS Secvest FUBE50001 The device contains a vulnerability related to information leakage.Information may be obtained and tampered with. ABUS Secvest FUBE50001 is a wireless control unit of German ABUS company. There is a security loophole in the wireless communication function of the ABUS Secvest FUBE50001 device, which is caused by the program not encrypting sensitive data. Advisory ID: SYSS-2020-014 Product: ABUS Secvest Wireless Control Device (FUBE50001) Manufacturer: ABUS Affected Version(s): N/A Tested Version(s): N/A Vulnerability Type: Missing Encryption of Sensitive Data (CWE-311) Risk Level: High Solution Status: Open Manufacturer Notification: 2020-04-03 Solution Date: - Public Disclosure: 2020-06-17 CVE Reference: CVE-2020-14157 Authors of Advisory: Michael Rüttgers, Thomas Detert, Matthias Deeg (SySS GmbH) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Overview: ABUS Secvest Wireless Control Device (FUBE50001) is a wireless control panel for the ABUS Secvest wireless alarm system. Some of the device features as described by the manufacturer are (see [1]): " * Easy operation via code or proximity keyfob The Secvest wireless control panel is an optional Secvest accessory. Every wireless control panel can be operated from your system via PIN code. It is possible to arm and disarm the panel via proximity keyfob. * Flexible use in entrance areas Up to 8 control panels can be integrated into the alarm system. These additional modules can be placed in various areas of the building. This provides added convenience for you, because Secvest can be armed and disarmed directly on the wireless control panel, without the need to go back to the central alarm panel every time. In addition to internal arming or arming individual sub-areas, you can also switch a single output, such as the garage door, if desired. * Secure wireless communication Thanks to a secure wireless communication procedure, this product is protected against ‘replay attacks’, as are the Secvest wireless alarm system and Secvest Touch alarm systems. This procedure for preventing third-party tampering exceeds the requirements of the “DIN EN 50131-1 level 2” security standard. Thus, an attacker observing radio signals of an ABUS FUBE50001 wireless control panel is able to see all sensitive data of transmitted packets as cleartext and can analyze the used packet format and the communication protocol. By knowing the correct PIN code or the ID of a valid ABUS Secvest proximity chip key, an attacker is able to disarm the wireless alarm system in an unauthorized way. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Proof of Concept (PoC): Michael Rüttgers, Thomas Detert, and Matthias Deeg developed different PoC software tools, either for the RFCat-based radio dongle YARD Stick One [3] in one version, or the GreatFet One neighbor Erica [4] in another one, that allowed sniffing out used PIN codes or used proximity chip key IDs when eavesdropping on the FUBE50001 wireless communication. The following output exemplarily shows a successful PIN code sniffing attack: $ python2 abus_fube50001_pin_sniffer.py ABUS Secvest FUBE50001 PIN Code Sniffer PoC - SySS GmbH (c) 2020 by Thomas Detert, Michael Rüttgers, and Matthias Deeg --- [*] Listening for ABUS FUBE50001 packets ... [*] Received packet: f0f352b4ccb4ccd52aab52d2acd2d34d4cb34cb333332b34d4b530f0f0f352b4ccb4ccd52aab52d2acd2d34d4cb34cb333332b34d4b530f0f0f333333333117162f5 [*] Decoded packet : da0a077ed5c549888800626b [*] Received packet: f0f352b4b32b4d352ad5332aab2cb34cd3332cccb4ccacb354acaaaaccccd2ab32aab54d30f0f0f352b4b32b4d352ad5332aab2cb34cd3332cccb4ccacb354acaaaa [*] Decoded packet : da86937707e4884040a0c8ecff005e1fb9 [*] Detected FUBE50001 packet with FUBE50001 PIN [+] Sniffed PIN code: 1337 (...) An example of a successful sniffing attack regarding the ID of an ABUS proximity chip key is illustrated in the following output: $ python2 abus_fube50001_chip_key_id_sniffer.py ABUS Secvest FUBE50001 Proximity Chip Key ID Sniffer PoC - SySS GmbH (c) 2020 by Thomas Detert, Michael Rüttgers, and Matthias Deeg --- [*] Listening for ABUS FUBE50001 packets ... [*] Received packet: f0f352b4b332b2cad52accd554d34cb32cccd33332b34ab2cd2b2d4ad32ad2aacaacd32b30f0f0f3057c0764bf788b6ce7d0de43f6c1cb71e7374b7bd7c7a1abe567 [*] Decoded packet: da81937707e488404018b9165b475f3c46 [*] Detected FUBE50001 packet with proximity token ID [+] Sniffed proximity chip key ID: 3805964445 (...) The described sniffing attacks are also demonstrated in the SySS Proof-of-Concept Video titled "ABUS Secvest Sniffing Attack" which is available on the SySS YouTube Channel [8]. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution: SySS GmbH is not aware of a solution for this reported security vulnerability. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Disclosure Timeline: 2020-04-03: Vulnerability reported to manufacturer 2020-06-17: Public release of security advisory ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ References: [1] Product website for ABUS Secvest wireless control device https://www.abus.com/eng/Home-Security/Alarm-systems/Secvest-wireless-alarm-system/Control-devices-and-extensions/Secvest-Wireless-Control-Device [2] SySS Security Advisory SYSS-2018-035 https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-035.txt [3] Product website YARD Stick One https://greatscottgadgets.com/yardstickone/ [4] GreatFET One neighbor Erica targeting the 315/433/868/915 MHz freqency bands https://github.com/AsFaBw/erica [5] GreatFET wiki https://github.com/greatscottgadgets/greatfet/wiki [6] SySS Security Advisory SYSS-2020-014 https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-014.txt [7] SySS GmbH, SySS Responsible Disclosure Policy https://www.syss.de/en/news/responsible-disclosure-policy/ [8] SySS Proof of Concept Video: ABUS Secvest Sniffing Attack https://www.youtube.com/watch?v=kCqAVYyahLc ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Credits: This security vulnerability was found by Michael Rüttgers and Thomas Detert. Mr. Rüttgers and Mr. Detert reported this finding to SySS GmbH where it was verified and later reported to the manufacturer by Matthias Deeg. E-Mail: matthias.deeg (at) syss.de Public Key: https://www.syss.de/fileadmin/dokumente/Materialien/PGPKeys/Matthias_Deeg.asc Key fingerprint = D1F0 A035 F06C E675 CDB9 0514 D9A4 BF6A 34AD 4DAB ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Disclaimer: The information provided in this security advisory is provided "as is" and without warranty of any kind. Details of this security advisory may be updated in order to provide as accurate information as possible. The latest version of this security advisory is available on the SySS website. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Copyright: Creative Commons - Attribution (by) - Version 3.0 URL: http://creativecommons.org/licenses/by/3.0/deed.en

Trust: 2.25

sources: NVD: CVE-2020-14157 // JVNDB: JVNDB-2020-006935 // CNVD: CNVD-2021-20276 // PACKETSTORM: 158204

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

category:['industrial device']sub_category:alarm

Trust: 0.1

sources: OTHER: None // CNVD: CNVD-2021-20276

AFFECTED PRODUCTS

vendor:abusmodel:secvest wireless control fube50001scope:eqversion: -

Trust: 1.0

vendor:abusmodel:secvest wireless remote control fube50001scope: - version: -

Trust: 0.8

vendor:abusmodel:secvest fube50001scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2021-20276 // JVNDB: JVNDB-2020-006935 // NVD: CVE-2020-14157

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-14157
value: HIGH

Trust: 1.0

NVD: JVNDB-2020-006935
value: HIGH

Trust: 0.8

CNVD: CNVD-2021-20276
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202006-1196
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2020-14157
severity: MEDIUM
baseScore: 4.8
vectorString: AV:A/AC:L/AU:N/C:P/I:P/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 6.5
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: JVNDB-2020-006935
severity: MEDIUM
baseScore: 4.8
vectorString: AV:A/AC:L/AU:N/C:P/I:P/A:N
accessVector: ADJACENT NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2021-20276
severity: MEDIUM
baseScore: 4.8
vectorString: AV:A/AC:L/AU:N/C:P/I:P/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 6.5
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2020-14157
baseSeverity: HIGH
baseScore: 8.1
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 5.2
version: 3.1

Trust: 1.0

NVD: JVNDB-2020-006935
baseSeverity: HIGH
baseScore: 8.1
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2021-20276 // JVNDB: JVNDB-2020-006935 // CNNVD: CNNVD-202006-1196 // NVD: CVE-2020-14157

PROBLEMTYPE DATA

problemtype:CWE-319

Trust: 1.0

problemtype:CWE-200

Trust: 0.8

sources: JVNDB: JVNDB-2020-006935 // NVD: CVE-2020-14157

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-202006-1196

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-202006-1196

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-006935

PATCH

title:Top Pageurl:https://www.abus.com/eng

Trust: 0.8

sources: JVNDB: JVNDB-2020-006935

EXTERNAL IDS

db:NVDid:CVE-2020-14157

Trust: 3.2

db:PACKETSTORMid:158204

Trust: 1.7

db:JVNDBid:JVNDB-2020-006935

Trust: 0.8

db:CNVDid:CNVD-2021-20276

Trust: 0.6

db:NSFOCUSid:47348

Trust: 0.6

db:CNNVDid:CNNVD-202006-1196

Trust: 0.6

db:OTHERid:NONE

Trust: 0.1

sources: OTHER: None // CNVD: CNVD-2021-20276 // JVNDB: JVNDB-2020-006935 // PACKETSTORM: 158204 // CNNVD: CNNVD-202006-1196 // NVD: CVE-2020-14157

REFERENCES

url:https://www.syss.de/fileadmin/dokumente/publikationen/advisories/syss-2020-014.txt

Trust: 3.1

url:http://packetstormsecurity.com/files/158204/abus-secvest-wireless-control-device-missing-encryption.html

Trust: 2.2

url:https://www.youtube.com/watch?v=kcqavyyahlc

Trust: 1.7

url:http://seclists.org/fulldisclosure/2020/jun/26

Trust: 1.6

url:https://nvd.nist.gov/vuln/detail/cve-2020-14157

Trust: 1.5

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-14157

Trust: 0.8

url:http://www.nsfocus.net/vulndb/47348

Trust: 0.6

url:https://ieeexplore.ieee.org/abstract/document/10769424

Trust: 0.1

url:http://creativecommons.org/licenses/by/3.0/deed.en

Trust: 0.1

url:https://www.syss.de/en/news/responsible-disclosure-policy/

Trust: 0.1

url:https://www.syss.de/fileadmin/dokumente/publikationen/advisories/syss-2018-035.txt

Trust: 0.1

url:https://www.abus.com/eng/home-security/alarm-systems/secvest-wireless-alarm-system/control-devices-and-extensions/secvest-wireless-control-device

Trust: 0.1

url:https://www.syss.de/fileadmin/dokumente/materialien/pgpkeys/matthias_deeg.asc

Trust: 0.1

url:https://github.com/asfabw/erica

Trust: 0.1

url:https://github.com/greatscottgadgets/greatfet/wiki

Trust: 0.1

url:https://greatscottgadgets.com/yardstickone/

Trust: 0.1

sources: OTHER: None // CNVD: CNVD-2021-20276 // JVNDB: JVNDB-2020-006935 // PACKETSTORM: 158204 // CNNVD: CNNVD-202006-1196 // NVD: CVE-2020-14157

CREDITS

Thomas Detert, Michael Ruttgers

Trust: 0.7

sources: PACKETSTORM: 158204 // CNNVD: CNNVD-202006-1196

SOURCES

db:OTHERid: -
db:CNVDid:CNVD-2021-20276
db:JVNDBid:JVNDB-2020-006935
db:PACKETSTORMid:158204
db:CNNVDid:CNNVD-202006-1196
db:NVDid:CVE-2020-14157

LAST UPDATE DATE

2025-01-30T19:38:04.886000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2021-20276date:2021-03-23T00:00:00
db:JVNDBid:JVNDB-2020-006935date:2020-07-22T00:00:00
db:CNNVDid:CNNVD-202006-1196date:2020-07-31T00:00:00
db:NVDid:CVE-2020-14157date:2024-11-21T05:02:45.830

SOURCES RELEASE DATE

db:CNVDid:CNVD-2021-20276date:2021-03-19T00:00:00
db:JVNDBid:JVNDB-2020-006935date:2020-07-22T00:00:00
db:PACKETSTORMid:158204date:2020-06-23T21:28:06
db:CNNVDid:CNNVD-202006-1196date:2020-06-17T00:00:00
db:NVDid:CVE-2020-14157date:2020-06-17T20:15:10.057