Description

Cybersecurity researchers have discovered a hardware backdoor in a particular model of the MIFARE Classic contactless card that allows access to hotel rooms and office doors. The vulnerability has been discovered in a version of the FM11RF08S, a MIFARE Classic card released in 2020 by Shanghai Fudan Microelectronics. According to Quarkslab Philippe Teuwen, backdoors allow attackers to compromise all user-defined keys on these cards, which are also quite diverse, and access the card in just a few seconds The private key used by the FM11RF08S is common to existing cards, making it increasingly easy for attackers to perform supply chain attacks. And there is the possibility of an immediate compromise on the cards In addition, a previous generation of the card, FM11RF08, inherited the same backdoor, which has been in use since November 2007. The vulnerability is also protected by another key but with the same risk Reverse-engineering the nonce generation mechanism can speed up the attack, reducing the time needed to crack the key by five to six times Although physical proximity to the card is required to execute the attack, but supply chain players can exploit this weakness on a large scale . Customers are advised to check whether they are at risk, especially since these cards are common in hotels across the US, Europe and India. The findings add security concerns to hotel banquet systems, including vulnerabilities in the Dormakaba Suffolk electronic RFID gates revealed earlier this year.