How HID High-Frequency Only Readers Are Vulnerable To Downgrade Attacks

Published Dec 19, 2023 14:43 PM

The main objection to IPVM's downgrade attack report was that it impacted only 125 kHz credentials. A similar vulnerability exists for high-frequency readers leveraging iClass legacy credentials, which IPVM was able to reproduce.

IPVM Image

Based on IPVM testing, we detail how HID high-frequency only readers are vulnerable to downgrade attacks from iClass SE / Seos to iClass Legacy credentials.

No ******** **** *** ** ******

**** ******* *** ** *** ******* times **** ** ******** ** *** request *** *******.

*** *** ******* ** * ******** request ***** ***'* *********, *********** **** the **** ********** ****** ***** ******* and *** **** ** ********* **** legacy ************, ******** ******* ***** *** iClass.

*** ******** ** *** ********* ** HID’s *** ********. *** ***** ******* have * ***** ** ********** ******** that **** ********** ********* **** *** right ******* ******* *********** *** ********. For *******, **** ***** ****** ** currently ******* **** * ********* ******* options, * ** ***** ** *** support ****. *****-********** ******* ***** ********* the *********** ** ******* *** **** of ********* **** **** ****** ********** technologies, * ********* **** *** *** be **** ** **** *********. ** also ***** ***** **** *** ****** Manager ** ****** ****** ************** ** the ***** *** **** *********** ** educate *** ********* ** *** ********** of ********* ****** ********** ********** ****** needed.

HID ********** ******* *****

***** *** ** **** ******** ******* include ****** ****** *******, ****** ***** readers ********** ** ********* *******.

*** ******** ************* **** "******* *******" *** ********** profiles, *** ***** ********* ***-********* *** high-frequency ***********, *** ****** **** ****-****, the ***** **** ****-*********-**** *********** ********* cracked ****** ******, *** *** **** with *** ******** ********** ***** *******.

IPVM Image

Downgrade ****** ** ****** ** / **** ** ****** ****** (**.** ***) ******

****'******** **** ****** ******* ******* ************ *** ****** *** ***** **** HID **** *** ******* *********** ****** *** ******* **** *** HID *** *** ** **** ** read *** **** **** **** ****** SE / **** *********** *** ********* them ** ****** ****** *** **** formats.

**** ******* ********* *** **** **** extracted ** ******* **** *** *** SAM ******* *** ********** ****** ****** and **** *********** **** ******** ** Flipper.

IPVM Image

**** ******** *** **** *********** **** an ****** ******* ****** ** ****** 37-bit ****** *** ***** ** *** multiClass ** ******. ****** ** ***'* proprietary **-*** ****** **** ******** ******** code *** **** *******, *** ***** with ****** *** ******* ** *** to "******* ***********."

IPVM Image

** *** "******** *******" *************, ******* successfully **** *** **** ********** *** downgraded ** ** ****** *** **** formats, ******** ******.

** *** "***** *******" ************* **** does *** ******* ****, ****** ****** emulation ******* ******, ******* **** *** not.

** *** "****-****" *************, **** ** known ****** ** ****, ******* **** was *** ******* ****** **** *** downgrade ******. *** ***** ***** *** to ******* ****** ****** *** ***** formats **** *** ****** ** ******* downgrade *******.

No ********** **** ***

**** *** *** **** *** ****** disclosure **** *** ** **** ********* attacks ** *** *************** ****** ** Flipper **** *** ******. ********* *** Flipper **** ** ****** ****** ***'* website **** *** ****** *** *******:

IPVM Image

*******

***** *** ** **** ********** ******** HID ****** *** ********** ** *********, showing ******* ********** ***** **** ** Prox *** ****** ****** ******** *** security ** ******** ****** ******* *******. While **** *************** *** *********** *** *** **.** Mhz ********* ****** ***** ********** *******, *** ************* ****** ******* ******** HID ****** ********** ***'* ************** ** mitigate ********* ******* ** ****.

** *** ***** ****, *********** *** end-users *** *** ****-**** ******* ** Elite/Custom **** **** ***** ******* ** prevent ********* *******.

Comments (3)
UI
Undisclosed Integrator #1
Dec 19, 2023

* **** ********* ** ** ***** with **** ** *** ********* ***** this ***** ******. ******** ******** *** readers ** *** **** ********* ****.

(1)
(1)
UI
Undisclosed Integrator #2
Dec 20, 2023

** ******** *** **** ************** ** the ***** ** ****** ** *** land.

**** ******* *** ****-**** ************** (** SEOS+DESFire) *** *** *** ** **. If *****-****, *** "**** ********" **** profile **** *** *** ******** *** encrypts *** *** ** ******* (**** SEOS), ***** ******** ** ********** ***** of ********.

******* *** *** ** **** ** the ****, ** *******'* ******, *** with * "**** *** **********" ********, making *** ******'* ***** ********* ** never * *** *****. **'* **** to ***** * **** ******* *** keys, *** **'* **** ****** **** you **** **** *** ****.

*************, ***** ***'* ** **** *** on ***** ** *** ****** ****. Elite's ***** *** *** ** **. Or ******, ** *** *** *** away **** **. **'* **** ** revoke *** **-***** ****** ***********, *** those *** *** ****-*****. ******* *** no *** ** **** **** ** the *****.

(1)
UI
Undisclosed Integrator #1
Dec 20, 2023

**** *********** ** ******:

*. **** *** *** **** *****, the **** *** *********** ** ***** on *******.

*. *** ***, ***'** ******* ***** most ** ***** ********* *** *** readable *** *** ******* ****. **** could ****** ******.

*. *** ***, ** ****** * can **** *** *** ** *** read ****** *** ** *** ***** get *** ******** *** *********** *** can ** ****** **** *** **********. Without ** *** *** *** **** response ** ******* **** ****** ******* and *** ****** **** *** *******.

(1)