Sciener, a company that develops software and hardware for electronic locks, has several vulnerabilities in their products. These vulnerabilities include brute forcing the unlockKey character, downgrading encryption protocols, reusing AES keys, and exploiting virtual keys and settings. Additionally, there are issues with verification procedures, impersonation attacks, plaintext message processing, and firmware updates. These vulnerabilities can be exploited by attackers with physical, adjacent, or Bluetooth connection proximity to the lock, resulting in compromised lock integrity. Affected versions include the Kontrol Lux lock, Gateway G2, and TTLock App. There is no software solution for these vulnerabilities, but disabling certain Bluetooth functions can prevent some attacks.
kb.cert.org
kb.cert.org
Create attached notes ...
