Cyberattackers can exploit access control measures installed on supposedly secure facility doors to gain unauthorized building access to sensitive locations - as well as breach internal IP networks directly from these systems, researchers are warning.
In a closed-door session at Black Hat Europe 2023 this month, analysts at Otorio demonstrated how attackers can easily subvert modern physical access control systems, which are typically installed by secure doors in the form of a badge-scanner, card-swiper, or keypad. PACSs using the Open Supervised Device Protocol are especially at risk, according to Eran Jacob, head of research at Otorio.
OSDP enables secure communication between a card- or badge-reader and the access controller itself, and it's been found to have multiple vulnerabilities in the past.
In the demonstration, the researchers were able to establish a man-in-the-middle presence on the serial connection behind the readers, overcome tamper protections, bypass OSDP to unlock doors for unauthorized physical access, and then exploit access controllers to pivot to the internal IP network via the serial channel.
This Cyber News was published on www.darkreading.com. Publication date: Wed, 20 Dec 2023 19:45:18 +0000