Jump to content
Security Installer Community

Vulnerabilities In A Honeywell Ademco System


Recommended Posts

Posted

Once again, not me.

 

This video is by a guy from the US, who spent quite a lot of time with a Honeywell Ademco system. It has a number of issues:

  • Ability to brute-force codes on an armed system from the panel
  • Ability to brute-force by using a small device connected to the ECP bus on the system
  • RF has no encryption and can be replayed

I'd imagine that there is quite a lot of stuff in this talk that will wind some people up, he doesn't like the terminology used in alarm systems, and a number of the issues he raises are only a problem with sloppily installed systems.

 

It's only in video form:

 

I have a blog, some of which is about alarm security and reverse engineering:
http://cybergibbons.com/

 

 

 

Posted

Not to be confused with the Galaxy range used widely here in Europe. Although worryingly, the RF range are compatible, so the same vulnerabilities may exist...

 

Although it's possible to snoop the RS485 bus on the Galaxy, it's not as easy (although not impossible) to add an emulated device or start entering codes repeatedly without causing a panel tamper condition and lockouts on the keypads.

 

Apart from the RF, things are quite different between the American panels and their European cousins.

Posted

The Galaxy G2-44+ supports both RS485 and ECP, but I don't think many connect to the ECP bus.

Archived

This topic is now archived and is closed to further replies.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.