Vulnerability Note VU#418072
Comcast XFINITY Home Security fails to properly handle wireless communications disruption
Comcast XFINITY Home Security does not fail securely, which may be leveraged to avoid triggering alarm events.
CWE-636: Not Failing Securely ('Failing Open')
Comcast XFINITY Home Security system components use the ZigBee communication protocol over a 2.4 GHz radio frequency band to maintain state between sensors and the base station. When component communications are disrupted, the system does not trigger any alerts and additionally may take from minutes to hours to re-establish communications, during which time no alarm escalation occurs. An attacker capable of disrupting wireless communications can avoid triggering Home Security alarm events.
A physically proximate attacker capable of disrupting wireless communications can avoid triggering Home Security system alarm events.
The CERT/CC is currently unaware of a practical solution to this problem.
Vendor Information (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Comcast||Affected||24 Nov 2015||05 Jan 2016|
CVSS Metrics (Learn More)
Thanks to Tod Beardsley and Phil Bosco of Rapid7, Inc, for reporting this vulnerability.
This document was written by Joel Land.
- CVE IDs: Unknown
- Date Public: 05 Jan 2016
- Date First Published: 05 Jan 2016
- Date Last Updated: 05 Jan 2016
- Document Revision: 10
If you have feedback, comments, or additional information about this vulnerability, please send us email.