Cracked 125kHz Access Control Migration Guide

By: Brian Rhodes, Published on May 19, 2017

Despite being one of the most popular credentials, 125 kHz credentials are easily copied and insecure as we showed in our test results, video embedded below:

However, changing to more secure credentials is not always a clear path, and doing it can cost thousands of dollars for even smaller systems.

In this guide, we cover the most common migration paths and examine the pros and cons of each, so you can help choose the best path forward.

This guide covers:

  • The 3 Most Common Migration Paths
  • Pros & Cons of Each Method
  • Biometrics Option
  • HID Global Formats More Costly
  • 13.56 MHz Read Ranges Shorter
  • Changeover Cost Is The Biggest Factor

******* ***** *** ** the **** ******* ***********, 125 *** *********** *** easily ****** *********** ** ** ****** in *** **** *******, ***** ******** *****:

*******, ******** ** **** secure *********** ** *** always * ***** ****, and ***** ** *** cost ********* ** ******* for **** ******* *******.

** **** *****, ** cover *** **** ****** migration ***** *** ******* the **** *** **** of ****, ** *** can **** ****** *** best **** *******.

**** ***** ******:

  • *** * **** ****** Migration *****
  • **** & **** ** Each ******
  • ********** ******
  • *** ****** ******* **** Costly
  • **.** *** **** ****** Shorter
  • ********** **** ** *** Biggest ******

[***************]

The ***** ****

*** **** ***** ** the *******: *** **** common *** *** **** formats **** ** ****** are ********** ***********, ** copying **** ** **** a ****** ** * few ******* *** ***** a *** *******. ***** the **** ****** ** these ******** *********** ** everyday ***, *** **** that ******* *** **** to ***** **** ******** undetected ** * **** issue *********.

Three ********* *****

*** ******** ** ***************: stop ***** *** *** credentials. ***** **** *****, higher ********* ******** ******* encryption *** ********* ******* of **** ******* ***** resulting ** ***** ********* changes ***** **** * logical ***********.

*******, ***** *** * number ** ******* *** migrating *******, **** **** varying ***** *** ********* for ********:

  • ****** ***** & ******* Immediately
  • ******* *****-******** *******, ********* Replace *****
  • ******* ******** *******, ********* Replace *****

*****, ** ******* **** method ** ***** *** weigh *** **** **. cons ** **** *********** which **** ** **** for ******** *******.

HID ****** ******* **** ******

*** *** ************* **** migrating **** **** ****** formats ** ******** ***** 13.56MHz ****** ****** ** adopted ** *** *****? The *** **** ****** options ***** **** **** two ********* *******:

** *******, *** ****** iClass ** **** ********* on * ***-****** *** per-credential ***** ******** ** MIFARE/DESFIRE. *** ****** ** the **** ********** ** largely *** ** *********, as *** *** ******* is ********, ** *** manufactured ********, ** *** or ***** ****** **** Abloy. ** ********, *** non-HID ******* *** '**** use' *** *********** **** for *** ************ ** build ******* ******* **** with ** ********* ****.

*** ****** ******* ********** between ****** ****** ******* varies ***** ** ********** part *******, *** *** cost ********** ********* ****** 10% - **% **** for *** *** ********. However, ********** ** ***** America, *******, *******/******* *******, and ******* ************ *** be ****** *** *** who ******* *********** ****** share ** **** ******. Elsewhere ** *** *****, NXP-based ******* *** ** more *******, *** *******/******* may ** **** *********.

*** ******** ******** ******* the *** *******, *** our:*** ** *** ***************.

13.56 *** **** ****** *******

**** ** *** *** only ********** ******* ***********. Maximum **** ***** ****** also ** ************* *********, with *** ***** ********* 125kHz ****** ******** ****** distances. ***** *** ******* range ** *** * typical ****** *** **** mount ** ******* ***** applications ***** ***** **** less **** * ****** away **** *** ******, using **** ********* **.***** formats ****** **** ** ranges ****** *** ******* garage ** ******* **** applications.

*** *******, ******* *** **** ***** readers***** ** ** **" with ******** *** ******* credentials, *** *******.** *** **************** ***** **" *** have ********* *** ** sell ********** *** **************** *** ****** ****** instead *** **** ***********.

Pros & **** ** ****

******** **** *** ***** options, *** **** ****** and ******* *** ******* cost *** ****** ****** method ** ********* *********** of **** *** *** readers *** **** *****, while *** ***** ********* but *********** **** *** most ********** ****** ** simply ******** * **.** MHz ****** ***** ******** units *** ***** ******** new ***** ** ***** as ******.

*** **** *** ** low ****, ********** ******** improvement, *** *** ****** impact ** ** *** a *********** ****** **** can **** ******** **** frequencies *** *******, ***** called '*****-********' *******. **** chart ***** *** *****-****:

** *** ******** *****, we ******** **** **** in *****.

One: ******* *** ***** & ******* ***********

**** ********* **** ** the **** ******, *** it ****** *** ******** gap *** ******* ** wholesale *********** ** *** system ******* *** ***** at ****. *********** ********** use ** *** *** credentials ***** **** *** exploit **** **********, *** such * ******* **** requires **** ********* ****** and ******* ************ ** replacing ******** *** *** issued *********** **** *** replacement **.** *** *****.

** *******, * ****** 13.56 *** ****** *** cost $*** - $*** and * ****** **** often ***** $* - $7 ****** ********** ************, configuration, *** **** ******** costs, ** **** * smaller ****** **** **** than * ***** *** 50 ***** *** *** into *** ********* ** dollars, *** ***** **********/ multi-site ******* *** **** multiple **** ** *********.

** ******** ** *** cost, ********* ******** *** the ******* ***** ******** credentials *** *** *****, so ******* *** ******** a ******* ***** ***** preparing *** ******* *** credentials **********. *** ****-***** applications *** **** ** be **-********** ********.

** * ******, *** 'replace ********** ** ****' migration ** ********* **** used ** ******* ******* where *** **** *** logistic ****** *** *****.

Two: ******* *****-******** *******, ********* ******* *****

**** ********* **** ** often *** *** ****, but ***** *** ******** can ***** ** *********. Like *** ***** ******, option *** ******** ********* replacement ** *** ******* to * *** ****** type ********** **** *********** at ****. ***** ****** 'multiclass' ** '***************' *******, these ***** *** **** either ********** ********* *** multiple *******.

***** **** **** ** reader ***** **** ****** credentials *** ** ******** on * ******* ***** rather **** *** ** once, ***** ******** * big ****** *** *** logistics ******* ** *********** credentials ** * ********** schedule.

***** *** **** ** these ******* ** ***** higher ** * ***-**** basis ******** ** * single ********** **.** ***-**** unit, *** ******* ** modest ** **% - 15%. *** ***** ********** of ********* ******* *** still **** *********, *** spreading *** *** ******* of ********* ********** ***********, even ** *** **** of ********** ******** *** kHz ******* *** ****** or ***** ****, ** acceptable *** **** ******** managers.

Three: ******* **** *******, ********* ******* *****

*** ***** ****** ** often *** ***** *********, but ******** *********** *********, careful ****** ********, *** often ******* ******** ***** used: ******* * *** reader **** ** *** old ***.

**** ** ******-**** ******* is ***** **** **** multi-function/multiclass *****, *** **** can ** ********* ******* logistical ********** ** *** existing ******* *** ***********.

*******, ********** *********** ******* near **** *****, **** when **** *** ********* frequencies, *** ****** **** range *********** ** **** unit. ********* ** ***** do *** ****** **** other *** ** ********* interfere **** **** ***** is ***** * ***** trial ********.

** *********** ** *** an *****, ********** *** very **** ***** ** be. ******** ********** ******* side ** **** ***** creates ** ********* ***** and ***** ***, ******** 125 *** *** *** 13.56 *** ******:

********, **** ********** ******** may *** ******* **** than *** ****** *****, and ********, ***********, *** perhaps **** ********** ********* of *** ****** *** be ********.

*******, *** ******* ** this ****** *** ***** smallest ** ** ***** factors ********** **** ****** installation, *** ********* ** new *********** *** ** done **** ** ***** urgency, **** ******** **** is ****** ********** ** continuing ** *** *** kHz **********.

Considering ********** *******

*** **** *******, *** opportunity ** ******* *** consider ***** ********** ***** entirely, **** **********. ***** the **** ** ******, palm, *** **** ******** have ********* **** *** last ******, *** **** of ***** ****** ***** are ********* **** **** 13.56 *** ************, *** they ***** ******* *********** outlays *** **** ********** and **** ******** ** how ** ******** *** the *** *******.

***** **** ***** *********** 'soft *****', ***** *** often *********** ** *********** issues **** ********** ***** transitions **** ** ******* or ****** ************, ******* perimeter ******** ******* ** bad ******* (*** **** clothing ******** **** ******), and ** **** ************* additional *********** **.** *** credentials *** ******* *** implemented ** ******* ***** regardless.

******* ** *** **** cost *** ********* *********** issues, ********* **** *** kHz ** ********** ** uncommon, ******** ********* ******** of ***** *********** ****** a **** ******** ****** against ****** ******* ** credential ******.

Changes **** *****

** *** *** *** smallest ****** *******, ******** cost ********* ****** *** fast ********* *******. *** users *** ******** ******** often *** ****** ** weigh *** **** ** 125 *** ******** ******* the **** ** ********* from **.

*** **** *****, *** risk *** ********* ** too ***** ** ******* spending *****, *******, *** emergence ** ***** **** copiers *** ******* *** amplified *** *****. ******** managers ****** *** ******** the ********** ** ******* unauthorized ********** *** '**** tech' *** *** ***** as **** ** ******* 'low ****' ********* ********** keys *** ** *** hardware ** *** *** retail *****.

Next **: ***** **.** *** *** ******?

** ******** *******, ** will **** ********* **.** MHz ******* ** *** which **** *** ********** to ******* ** ******** attacks ***** ********** ******* or *********** ******** ***** tools. **** *** *** results ** ***** ****** format ** '****' *** if **** ***** *** risky.

Comments (10)

We just did some red team testing at one of our locations and this came up. Impeccable timing once again boys, cheers.

Has anyone recommended/used RFID Blocking Badge Holders that are designed to block low frequency 125kHz? This question is related to "digital pickpocketing" We all know you cannot block it 100% unless wrapped in foil or a lead box but by using RFID Blocking Holders you can reduce the ability to be compromised.

What are you doing to mitigate the risk while doing the obvious by getting rid of the vulnerability all together? When you have 250K Cardholders and over 10K Access Points replacing the vulnerability is not an easy task.

We have purchased several blocking holders/sleeves and will be doing a test this week. Look for that report soon.

Our post on card shields is published here: Anti-Hack Access Card Shields Tested

We tried this ourselves, and I was able to read even through a carbon fiver RFID blocking wallet.

Last year we replaced our entire compliment of 10K prox cards with dual-format HID cards, then implemented a project to begin replacing readers the old prox readers with iClass units at +50 sites beginning with the perimeter, then main access points and critical doors. Also issued a directive to our security vendor that all new and replacement readers are to be iClass. Process is working pretty well; card replacement took 6mths and allowed us to updated all cardholder info (photos, security questions, PIN's etc). By having the cards compatible with both format readers, no disruptions to the end users. Side-note: if you include a PIN requirement with 125khz cards, doesn't matter if people have a clone (as long as people don't keep the PIN with the card).

if you include a PIN requirement

#2, thanks for sharing. Has there been any notable pushback or complaints about requiring a pin? It would seem to increase delay / add interruption to entering. On the other hand, depending on how secure your facility needs to be, it may be worth it.

Where did you get that particular writer? I want one to bring around with me to demo how easy it is. I could probably sell a lot of readers and cards once they see it.

People will always complain, but make the application reasonable, explain the whys and stick to a standard (don't make exceptions for specific sites).

The requirements has always been in place as part of our layering strategy, specifically at exterior doors outside of core business hours. This way you minimize the number of access points where they'd encounter delays (only 3sec per user/transaction) and only about 25% of staff are affected by the requirement.

Biggest challenge was sites deviated from the standard over the years, and people forgot their PIN's. Enter the new ID roll-out where we required people to pick a new PIN and made it part of the enrollment process (like when signing up for a credit card).

This also provided us an awareness opportunity to explain why PIN's are required.

20% of people will complain no matter what, 20% will tow the line no matter what, it's the middle 60% you need to try and win over and the only way to do that is with a good awareness and comm strategy.

Agreed, completely. I found it to be a lot more helpful when communication goes out from security to the employees on a regular basis, not just when something is changing. If the general employee population understands the basis on which these decisions are being made, and understands their work and their inconvenience was considered in the process, they're a lot more likely to toe the line. That's how you develop a see something, say something culture, and make people feel like they're part of the solution, not just a victim of it.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Directory of 55 Video Surveillance Startups on Jun 25, 2019
This directory provides a list of video surveillance startups to help you see and research what companies are new or not yet broadly known. 2019...
HID Mobile Tested on Jun 21, 2019
HID Global is one of the largest access brands, but their mobile access has had challenges. Indeed, the company has already restructured their...
Genetec Synergis Cloud Link - Complex, Costly and Confusing on Jun 18, 2019
Genetec's Synergis Cloud Link is complex, costly and confusing compared to competitor access control architectures. Inside this note, we examine...
Biometrics Usage Statistics 2019 on Jun 17, 2019
While face and fingerprint recognition are used regularly for smartphones, it is not as common in physical security. In this note, we examine...
Farpointe Data Conekt Mobile Access Reader Tested on Jun 13, 2019
California based Farpointe Data has been a significant OEM supplier of conventional access readers for years to companies including DMP, RS2, DSX,...
Manufacturer Favorability Guide 2019 on Jun 12, 2019
The 259 page PDF guide may be downloaded inside by all IPVM members. It includes our manufacturer favorability rankings and individual...
Dumber Techs, Bad Box Movers, Says Australian Distributor on Jun 10, 2019
Techs today are "dumber" than they used to be, despite better education and training and that makes a typical day "frustrating" for one...
OSDP Access Control Guide on Jun 04, 2019
Access control readers and controllers need to communicate. While Wiegand has been the de facto standard for decades, OSDP aims to solve major...
Vidsys New President Interviewed on May 31, 2019
A decade ago, PSIM was hot with projections then of a billion dollar market by now. This has not come close to happening. However, Vidsys, one of...
China Jaywalking Facial Recognition Guide on May 27, 2019
News reports touting the PRC's AI prowess often showcase facial recognition cameras being used to automatically catch and fine jaywalkers.  In...

Most Recent Industry Reports

Security Dealer 'Social Media Contractor' Program on Jun 25, 2019
A $20,000 video surveillance system can be yours for free if you are willing to post on social media about the security dealer. Good deal, bad...
Axis Live Privacy Shield Analytics Tested on Jun 25, 2019
Privacy is becoming a bigger factor in video surveillance, driven both by increased public awareness and by GDPR. Now, Axis has released Live...
Directory of 55 Video Surveillance Startups on Jun 25, 2019
This directory provides a list of video surveillance startups to help you see and research what companies are new or not yet broadly known. 2019...
Hikvision Colorvu Camera Tested on Jun 24, 2019
Hikvision says their new ColorVu line captures "vivid chromatic images in darkness", with unconventional white light illuminations whereas most...
China Subway Facial Recognition System Examined on Jun 24, 2019
A China city of 6+ million people has installed facial recognition-enabled gates in subways, allowing commuters to enter stations by simply showing...
HID Mobile Tested on Jun 21, 2019
HID Global is one of the largest access brands, but their mobile access has had challenges. Indeed, the company has already restructured their...
Genetec Beats Milestone For IHS #1 on Jun 21, 2019
For years, Milestone has touted that they are the #1 VMS. Now, Genetec has beaten them in IHS rankings. But what is this? Even other manufacturers...
Risk of Amazon Alexa Guard: No Battery Or Cell Backup on Jun 20, 2019
Amazon positions its Alexa Guard Service as a "smart home security system" and says it can help you "keep your home safe". However, the...
Exacq Remote Cloud Access Tested on Jun 20, 2019
Remote cloud access has been missing from most VMSes (including Exacq and Milestone). Now, Exacq, after releasing Cloud Drive Storage earlier in...
Briefcam Buys Frost Award* on Jun 20, 2019
Frost 'awards' are well-known and widely disrespected. Now Briefcam is touting their win. The way it has worked for many years is that Frost...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact