Jump to content
Security Installer Community

Vulnerabilities In The Abus Secvest Wireless Alarm


Recommended Posts

Once again, not my work, but a look at the Abus Secvest alarm system, which is at least partially made by Cooper.

 

The wireless protocol isn't significantly different to a Yale or Friedland DIY alarm - no rolling code, no encryption, no authentication. Vulnerable to replay attacks.

 

http://sitsec.net/files/secvest_analysis.pdf

 

This is a grade 2 alarm, but is a million miles behind something like a Pyronix Enforcer or Texecom Ricochet in terms of security.

I have a blog, some of which is about alarm security and reverse engineering:
http://cybergibbons.com/

 

 

 

Link to comment
Share on other sites

Yeah, the Abus kit is stupidly expensive - but I think if you are trade in the right country, it is probably a lot less? I know what I pay for alarms is a lot more than trade here.

 

What I found particularly interesting about this alarm is that it is very modern and forward thinking on the IP front, but it's like a system from 20 years ago on the RF front. It must be what the consumers want.

I have a blog, some of which is about alarm security and reverse engineering:
http://cybergibbons.com/

 

 

 

Link to comment
Share on other sites

Archived

This topic is now archived and is closed to further replies.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.