Vulnerabilities / Threats // Vulnerability Management
02:00 PM
Connect Directly

XFINITY Security System Flaw Allows Sneak Attacks By Jamming Radio Frequency

Rapid7 Researcher finds that when communication between base station and sensors is disrupted, alarm system continues to think it is armed.

The prognosticators promised us lots of smart home vulnerabilities in 2016 and it only took a couple of days for the first disclosure to come out of the woodwork. A researcher with Rapid7 today reported a flaw in Comcast XFINITY's Home Security System that allows attackers to jam the radio frequency the system the system uses without ever triggering an alert to the home owner.

According to Phil Bosco, security consultant for Rapid7, his team found that all it takes to open windows or doors without detection is interrupting the 2.4 GHz radio frequency band used by the base station to communicate with window and door sensors. Rather than alerting the user to a change in state of the security system, the ZigBee-based system continues to report that the sensors are intact, doors are closed, and no motion is detected -- while any movement in the doors remains unmonitored.

This is a huge black spot on the peace of mind that security system users get when out of the house and checking their phone for updates on the protection of their homes. Attackers would be able to slip in and out of a protected building by using one of a couple of simple attack techniques to carry this out, says Tod Beardsley, security research manager for Rapid7.

"There are any number of techniques that could be used to cause interference or deauthentication of the underlying ZigBee-based communications protocol, such as commodity radio jamming equipment and software -based deauthentication attacks on the ZigBee protocol itself," Beardsley wrote in a blog posted today about the research.

His team initially carried out the testing on this system by putting tin foil around a window/door sensor while the system was armed, and then removing the magnet from the sensor to simulate a radio jamming attack.

"Once the magnet is removed from the sensor, the sensor was unwrapped and placed within a few inches from the base station hub that controls the alarm system," Beardsley says. "The system continued to report that it is in armed state. The amount of time it takes for the sensor to reestablish communications with the base station and correctly report is in an open state can range from several minutes to up to three hours."

The last detail is perhaps one of the most disconcerting. The system has no time limit on a communication interruption before it reports a change in state, and even when communication is back up, there's no consistent way for the base station and sensor to sync back up because the system already thinks nothing has changed.

Unfortunately, the flaw currently has "no practical mitigations," according to the researchers. Rapid7 initially disclosed this issue to the vendor in early November and to CERT later that month.


Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Ninja
1/10/2016 | 11:45:27 AM
2.4Ghz is such a commonly used frequency and so easy to disrupt. (IE: Baby Monitors, Drones, Cameras, Routers..) A simple wireless assessment in any given area immediately shows multiple overlapping channels in this range. Although less common this also occurs in the 5Ghz range as well. The FCC should reserve higher band frequencies for security systems or XFINITY should just utilize GSM networks. Even most modern cordless phones take advantage of DECT 6.0. Why is this not being used in some way for communication from the sensor to base?
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: just wondering...Thanx
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.