Description
The dormakaba registration units 9002 (PIN Pad Units) have an exposed UART header on the backside. The PIN pad is sending every button press to the UART interface. An attacker can use the interface to exfiltrate PINs. As the devices are explicitly built as Plug-and-Play to be easily replaced, an attacker is easily able to remove the device, install a hardware implant which connects to the UART and exfiltrates the data exposed via UART to another system (e.g. via WiFi).
Problem types
CWE-1295: Debug Messages Revealing Unnecessary Information
Product status
Credits
Clemens Stockenreitner, SEC Consult Vulnerability Lab
Werner Schober, SEC Consult Vulnerability Lab
References
r.sec-consult.com/dormakaba
r.sec-consult.com/dkaccess
www.dormakabagroup.com/en/security-advisories