Ethical Hacking News
Exploiting the Unseen Vulnerabilities: A Deep Dive into Securam's Secure Locks
AI-powered hacking tools can be used to compromise some of the most secure safes on the market, including Securam's ProLogic locks.A major security flaw was discovered in Securam's ProLogic lock, allowing authorized users to open the safe immediately with a "super code" combination.The default password for Securam ProLogic locks is easily guessable and can be bypassed using a technique called voltage glitching.CodeSnatch, a tool developed by researchers Omo and Rowley, can extract the "super code" combination from the lock's firmware and dump all information from the lock's firmware.Not all Securam ProLogic locks are vulnerable to this attack, but patching the security flaws is possible with a manual update process.The vulnerabilities highlight the need for greater awareness and vigilance among consumers when it comes to safe locks and other devices that are vulnerable to exploitation.
In a shocking revelation, security researchers Omo and Rowley have demonstrated how AI-powered hacking tools can be used to compromise some of the most secure safes on the market. The research, published recently, highlights the vulnerability of Securam's ProLogic locks, which are widely used by numerous manufacturers, including Liberty Safe, Fort Knox, and CVS.
According to Omo and Rowley, the researchers behind this groundbreaking study, discovered a major security flaw in Securam's ProLogic lock. By reverse-engineering the Renesas chip that serves as the lock's main processor, they developed a tool called CodeSnatch, which can extract a "super code" combination from the lock that allows authorized users to open the safe immediately.
In their research, Omo and Rowley demonstrated how they could bypass the default password for Securam ProLogic locks, which is an absurdly simple code. They also showed how they could use a technique called voltage glitching to obtain the new password, if it has been changed by the manufacturer.
The researchers found that CodeSnatch can be used to dump all information from the lock's firmware, including the encrypted "super code" and the key that decrypts it. This means that an attacker with access to the lock could potentially crack the combination using a simple Python script.
However, not all Securam ProLogic locks are vulnerable to this attack. The researchers discovered that some newer models of the lock have had their default password changed by the manufacturer, rendering CodeSnatch ineffective.
Despite the vulnerability, Omo and Rowley emphasize that patching these security flaws is possible, but it would require a manual update process, which could be slow and expensive. They are concerned that if left unpatched, these vulnerabilities could be exploited by malicious actors, potentially leading to real-world consequences.
Omo and Rowley's research has significant implications for the broader cybersecurity landscape. As they note, there are wide gaps in US cybersecurity standards for consumer products, and their study highlights the need for more robust security measures in the production of safe locks.
In response to Omo and Rowley's findings, Sen. Ron Wyden has expressed his concern about the potential risks posed by backdoors in encryption technology. He notes that Congress must reject calls for new backdoors in encryption technology and fight all efforts by other governments to force US companies to weaken their encryption to facilitate government surveillance.
The discovery of these vulnerabilities has also led Securam to take steps to address them. The company's CEO, Chunlei Zhou, has stated that the specific "vulnerabilities" alleged by Omo and Rowley are already well-known to industry professionals and affect other safe lock providers as well.
However, not all manufacturers have been forthcoming about their response to these vulnerabilities. High Noble Safe Company and CVS did not respond to WIRED's inquiries, while Liberty Safe has acknowledged the issue but does not plan to offer a firmware update for locks already in use.
As the cybersecurity landscape continues to evolve, Omo and Rowley's research serves as a reminder of the importance of robust security measures in consumer products. Their discovery highlights the need for greater awareness and vigilance among consumers when it comes to safe locks and other devices that are vulnerable to exploitation.
In conclusion, the research by Omo and Rowley has shed light on some of the most significant vulnerabilities in Securam's ProLogic locks, which could have far-reaching consequences if left unaddressed. As we move forward into an increasingly connected world, it is crucial that manufacturers prioritize cybersecurity measures and that consumers remain vigilant when it comes to protecting themselves against potential threats.
Related Information:
https://www.ethicalhackingnews.com/articles/Unlocking-the-Dark-Secrets-of-Securams-Safes-An-In-Depth-Analysis-of-the-Most-Vulnerable-Safe-Locks-on-the-Market-ehn.shtml
https://www.wired.com/story/securam-prologic-safe-lock-backdoor-exploits/
Published: Fri Aug 8 16:19:14 2025 by llama3.2 3B Q4_K_M