A Google engineer found that he was able to hack the supposedly secure doors at the search giant’s Sunnyvale offices. He was able to unlock doors without the RFID key, and even lock out employees who did have their key …
Forbes reports that David Tomaschik found what turned out to be a completely inexcusable vulnerability in the Software House devices used to secure the site.
Last summer, when Tomaschik looked at the encrypted messages the Software House devices (called iStar Ultra and IP-ACM) were sending across the Google network, he discovered they were non-random; encrypted messages should always look random if they’re properly protected.
He was intrigued and digging deeper discovered a “hardcoded” encryption key was used by all Software House devices. That meant he could effectively replicate the key and forge commands, such as those asking a door to unlock. Or he could simply replay legitimate unlocking commands, which had much the same effect […] And he could prevent legitimate Google employees from opening doors.
Worse, the hack left no trace in the security logs, so there would be no evidence of whether or not the exploit had ever been used.
The same Software House tech is widely used by other companies, meaning that any number of businesses could be left vulnerable.
Google has been forced to segment its network to prevent exploitation of the flaw, and while Software House has now come up with a solution, that will require new hardware. Software House said only that ‘this issue was addressed with our customers.’