Jump to content

SecuRam installs backdoor on ProLogic series safe locks.: Difference between revisions

From Consumer Rights Wiki
Chuck (talk | contribs)
[Incident]: Incident description + new references
Chuck (talk | contribs)
Company Response + Consumer Response + more references
Line 12: Line 12:
In 2023 new broke that Liberty Safe kept a master key for all safes that it sold.<ref>{{Cite news |last=Levenson |first=Michael |date=2023-09-08 |title=How a Company That Makes Gun Safes Angered Gun Owners |url=https://www.nytimes.com/2023/09/08/business/liberty-safe-codes.html |work=The New York Times}}</ref> Security researcher Mark Omo and James Rowley attempted to discover vulnerabilities involving this master key. They were unsuccessful, but did discover two techniques for opening safes sold by Liberty Safe that were equipped with SecuRam ProLogic series locks.<ref name=":0">{{Cite news |last=Greenberg |first=Andy |date=2025-08-08 |title=Hackers Went Looking for a Backdoor in High-Security Safes—and Now Can Open Them in Seconds |url=https://www.wired.com/story/securam-prologic-safe-lock-backdoor-exploits/ |work=WIRED}}</ref>
In 2023 new broke that Liberty Safe kept a master key for all safes that it sold.<ref>{{Cite news |last=Levenson |first=Michael |date=2023-09-08 |title=How a Company That Makes Gun Safes Angered Gun Owners |url=https://www.nytimes.com/2023/09/08/business/liberty-safe-codes.html |work=The New York Times}}</ref> Security researcher Mark Omo and James Rowley attempted to discover vulnerabilities involving this master key. They were unsuccessful, but did discover two techniques for opening safes sold by Liberty Safe that were equipped with SecuRam ProLogic series locks.<ref name=":0">{{Cite news |last=Greenberg |first=Andy |date=2025-08-08 |title=Hackers Went Looking for a Backdoor in High-Security Safes—and Now Can Open Them in Seconds |url=https://www.wired.com/story/securam-prologic-safe-lock-backdoor-exploits/ |work=WIRED}}</ref>


==The Incident: Discovery that the Backdoor is Vulnerable ==
==The Incident: Discovery that the Backdoor is Vulnerable==
On August 8th, 2025 while on-stage at DEF CON<ref>[https://media.defcon.org/DEF%20CON%2033/DEF%20CON%2033%20presentations/Mark%20Omo%20James%20Rowlery%20-%20Cash%2C%20Drugs%2C%20and%20Guns%20Why%20Your%20Safes%20Aren%27t%20Safe.pdf DEF CON Presentation] Slides by Mark Omo and James Rowley</ref><ref>[https://infocondb.org/con/def-con/def-con-33/cash-drugs-and-guns-why-your-safes-arent-safe Cash, Drugs, and Guns: Why Your Safes Aren't Safe] - DEF CON talk abstract by Mark Omo and James Rowley</ref> in Las Vegas, researchers Mark Omo and James Rowley demonstrated that SecuRam ProLogic safe locks can be opened by unauthorized users without the passkey using backdoors installed by the manufacturer. In the interest of public safety, they opted not to publicly reveal the techniques they discovered. They did however provide a live demonstration to journalist Andy Greenberg from WIRED.<ref name=":0" />
On August 8th, 2025 while on-stage at DEF CON<ref>[https://media.defcon.org/DEF%20CON%2033/DEF%20CON%2033%20presentations/Mark%20Omo%20James%20Rowlery%20-%20Cash%2C%20Drugs%2C%20and%20Guns%20Why%20Your%20Safes%20Aren%27t%20Safe.pdf DEF CON Presentation] Slides by Mark Omo and James Rowley</ref><ref>[https://infocondb.org/con/def-con/def-con-33/cash-drugs-and-guns-why-your-safes-arent-safe Cash, Drugs, and Guns: Why Your Safes Aren't Safe] - DEF CON talk abstract by Mark Omo and James Rowley</ref> in Las Vegas, researchers Mark Omo and James Rowley demonstrated that SecuRam ProLogic safe locks can be opened by unauthorized users without the passkey using backdoors installed by the manufacturer. In the interest of public safety, they opted not to publicly reveal the techniques they discovered. They did however provide a live demonstration to journalist Andy Greenberg from WIRED.<ref name=":0" /><ref name=":1">{{Cite web |date=2025-09-11 |title=We Digitally Cracked A High-Security Safe {{!}} Hacklab {{!}} WIRED |url=https://www.youtube.com/watch?v=upVzWfokDQc |website=Youtube}}</ref>
 
===[Company]'s response===
{{Ph-I-ComR}}
 
 
==Lawsuit==
{{Ph-I-L}}


== SecuRam's Response ==
SecuRam's CEO Chunlei Zhou responded to the discoveries by saying that the vulnerabilities were already known by industry professionals. Zhou also added that SecuRam will not provide updated firmware for vulnerable locks, but will be releasing new ProLogic safe locks that are free from the demonstrated vulnerabilities by end of year 2025.<ref name=":0" /><ref name=":1" />


==Consumer response==
==Consumer response==
{{Ph-I-ConR}}


On  August 8th, 2025 in response to SecuRam CEO Chunlei Zhou's statements, researchers Mark Omo and James Rowley rebutted by saying that the vulnerabilities were not previously known to the public. Liberty Safe has also responded to Zhou's statements, claiming that the vulnerabilities were previously unknown to them.<ref name=":0" /><ref name=":1" />


==References==
==References==

Revision as of 00:31, 16 September 2025

Short summary of the incident using references [1]. Usually 2-3 sentences that summarize the contents or the article. When writing the article, insert text in the space below this box, and then delete this tip box (and the other tip boxes below). In the visual editor, just click on a box and press backspace to delete it. In the source editor, simply delete the double curly brackets, and the text inside them.


Add your text below this box. Once this section is complete, delete this box by clicking on it and pressing backspace.


Background

In 2023 new broke that Liberty Safe kept a master key for all safes that it sold.[2] Security researcher Mark Omo and James Rowley attempted to discover vulnerabilities involving this master key. They were unsuccessful, but did discover two techniques for opening safes sold by Liberty Safe that were equipped with SecuRam ProLogic series locks.[3]

The Incident: Discovery that the Backdoor is Vulnerable

On August 8th, 2025 while on-stage at DEF CON[4][5] in Las Vegas, researchers Mark Omo and James Rowley demonstrated that SecuRam ProLogic safe locks can be opened by unauthorized users without the passkey using backdoors installed by the manufacturer. In the interest of public safety, they opted not to publicly reveal the techniques they discovered. They did however provide a live demonstration to journalist Andy Greenberg from WIRED.[3][6]

SecuRam's Response

SecuRam's CEO Chunlei Zhou responded to the discoveries by saying that the vulnerabilities were already known by industry professionals. Zhou also added that SecuRam will not provide updated firmware for vulnerable locks, but will be releasing new ProLogic safe locks that are free from the demonstrated vulnerabilities by end of year 2025.[3][6]

Consumer response

On August 8th, 2025 in response to SecuRam CEO Chunlei Zhou's statements, researchers Mark Omo and James Rowley rebutted by saying that the vulnerabilities were not previously known to the public. Liberty Safe has also responded to Zhou's statements, claiming that the vulnerabilities were previously unknown to them.[3][6]

References

  1. ref goes here
  2. Levenson, Michael (2023-09-08). "How a Company That Makes Gun Safes Angered Gun Owners". The New York Times.
  3. 3.0 3.1 3.2 3.3 Greenberg, Andy (2025-08-08). "Hackers Went Looking for a Backdoor in High-Security Safes—and Now Can Open Them in Seconds". WIRED.
  4. DEF CON Presentation Slides by Mark Omo and James Rowley
  5. Cash, Drugs, and Guns: Why Your Safes Aren't Safe - DEF CON talk abstract by Mark Omo and James Rowley
  6. 6.0 6.1 6.2 "We Digitally Cracked A High-Security Safe | Hacklab | WIRED". Youtube. 2025-09-11.


Add a category with the same name as the product, service, website, software, product line or company that this article is about.

The "Incidents" category is not needed.


Add your text below this box. Once this section is complete, delete this box by clicking on it and pressing backspace.