HID Access Controller Hacker Vulnerability

Login to read this IPVM discussion.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

***** **** *** ***** **** ** *** **** *** ****** of ******* ** *** **** ******* ** *** ***********. *******, that *** *** ** **********, *** ** ***** **** ************* harder ** ******* **** ******** **** ********** *******.

* ****** ******* ** *******, **** ******** ******* ** *** flaw:

******** ****** ***** ********** * **** ** *** **** ***********

*** **********:

  1. *** ******* ****** ***'* '**********' ******* ******* ** **** **** (***).
  2. *** ***'* ************* ******* ** **** *** *** ******* ******** to **** ******* ****-********
  3. *********** *** **** *********** ** ***** *** ******* *** ** blink ** ******, ********* '* **** ** *** ************ ** *** ****-******** ***** **** is *** ** *** ******() ****.'
  4. **** *****, *** ******** **** ********** **** "** **** ******* *****, *** ********* ******* **** ** ****, so ******** ******* ** **** ** **** **** ** *** as ****, *********** ****** ** ******** ******* **** *** ******", *** ***** ** ** ******* ** **** ******** ***** done.

*** ** *** **** ***'* * *** *******, **** *** salacious ********* ** *** ****** **** ******* **** **** *** unit ***** ** *******, *** **** ***** ********.

*** ******* ***** ******* * ******** *** *** **** ********, or ** ** *** ******* ** ***** ******** ** ***. I'll *********** **** *** ****** ****.