Jump to content
Security Installer Community

Csl Dualcom Cs2300-R Vulnerabilities


Recommended Posts

As many of you know, I spent some time researching the CSL CS2300-R SPTs last year. I found a series of issues that I think are serious problems. CSL have had 17 months to deal with these issues, and after them dawdling, I opted for co-ordinated disclosure of the issues via CERT/CC.

 

CSL have had 45 days to respond to CERT/CC, and only did so on Friday with a statement that is largely spin and distraction.

 

In summary, the issues found:

  • CSL have developed incredibly bad encryption, on a par with techniques state-of-the-art in the time before computers.
  • CSL have not protected against substitution very well
  • CSL can’t fix issues when they are found because they can’t update the firmware
  • There seems to be a big gap between the observed behaviour of the CS2300-R boards and the standards
  • It’s likely that the test house didn’t actually test the encryption or electronic security
  • Even if a device adheres to the standard, it could still be full of holes
  • CSL either lack the skill or drive to develop secure systems, making mistake after mistake
I have written a blog post detailing these issues, which also links to the full PDF report.

 

Until CSL can demonstrate that their products are standards compliant and secure, I would advise not using them, especially for higher grades.

Edited by cybergibbons

I have a blog, some of which is about alarm security and reverse engineering:
http://cybergibbons.com/

 

 

 

Link to comment
Share on other sites

Is the 2300 the board in grade 3 mode?

The only difference between the grades is the reporting time, as far as I can tell.

The encryption, the protocol, the lack of firmware updates etc. are the same regardless of grade.

I have a blog, some of which is about alarm security and reverse engineering:
http://cybergibbons.com/

 

 

 

Link to comment
Share on other sites

cg what responses have you had from csl regarding this?

They haven't communicated with me at all since they tried getting my home address 6 weeks ago.

its a bit over my head but can the unit be defeated in the field without access to the unit itself?

I believe it can, yes. Certainly the ones that use the IP path can be sniffed and spoofed with little trouble. The problem is that I can't push the boundaries any further to prove it.

The real point is that their systems have been designed and operated by people who very clearly are incompetent. If anyone has looked at their security, CSL have totally ignored any findings. God knows what else is there. If you aren't regulated by the law, it could be awful.

I have a blog, some of which is about alarm security and reverse engineering:
http://cybergibbons.com/

 

 

 

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.