Incident: Tapplock One Security Flaws and Vulnerabilities Lead to Failure.

Published Date: 2018-03-29

Postmortem Analysis
Timeline 1. The software failure incident with the Tapplock One occurred in June 2018 as mentioned in the article [69856].
System 1. Tapplock One's digital security system failed, allowing attackers to obtain sensitive information, locate and open the lock by pulling information directly from the company's API server [69856].
Responsible Organization 1. Tapplock company was responsible for causing the software failure incident reported in the article [69856].
Impacted Organization 1. Customers who purchased the Tapplock One padlock were impacted by the software failure incident as it had security flaws and vulnerabilities that could potentially compromise the security of their valuables [69856].
Software Causes 1. Security researchers pointed out physical and software security issues with the Tapplock One, leading to vulnerabilities that allowed attackers to twist off the back plate and disassemble the lock using a standard screwdriver [69856]. 2. The Tapplock One's digital security had major issues, with reports of anyone being able to obtain sensitive information, locate, and open the lock by pulling information directly from the company's API server [69856].
Non-software Causes 1. Physical security issues with the Tapplock One, such as the ability to twist off the back plate and disassemble the lock with a standard screwdriver [69856]. 2. Design flaw in the Tapplock One that allowed attackers to exploit vulnerabilities in the lock's physical structure [69856].
Impacts 1. The software failure incident with the Tapplock One resulted in major security issues, including vulnerabilities that allowed attackers to twist off the back plate and disassemble the lock with a standard screwdriver, as well as obtain sensitive information, locate, and open the lock by pulling information directly from the company's API server [69856].
Preventions 1. Conducting thorough security testing: The software failure incident with the Tapplock One could have been prevented by conducting thorough security testing to identify vulnerabilities and weaknesses in the lock's digital security [69856]. 2. Implementing secure coding practices: By following secure coding practices during the development of the lock's software, such as input validation, encryption, and secure authentication mechanisms, potential security flaws could have been minimized [69856]. 3. Regular software updates and patches: Ensuring that the software of the Tapplock One receives regular updates and patches to address any identified security issues or vulnerabilities could have helped prevent the incident [69856].
Fixes 1. Implementing firmware updates to address the reported security issues with the Tapplock One [69856]. 2. Resolving the digital security issues with a firmware update rolling out [69856]. 3. Working on fixing the security issues related to obtaining sensitive information, locating, and opening the lock by pulling information directly from the company's API server [69856].
References 1. Security researchers 2. Company's API server 3. Tapplock team 4. Tapplock app 5. Tapplock website 6. CES 2018 exhibition 7. Master Lock 8. Nokē Bluetooth Padlock 9. Kwikset's Kevo line of smart locks 10. Kevo Fob

Software Taxonomy of Faults

Category Option Rationale
Recurring unknown The articles do not provide information about a software failure incident happening again at the same organization or with its products and services (option a) or at other organizations or with their products and services (option b). Therefore, the answer to the question is 'unknown'.
Phase (Design/Operation) design, operation (a) The software failure incident related to design: The Tapplock One padlock was reported to have a design flaw that allowed an attacker to twist off the back plate and disassemble the lock using a standard screwdriver. This design flaw raised concerns about both physical and software security issues with the Tapplock One [69856]. (b) The software failure incident related to operation: The Tapplock One faced security issues where sensitive information could be obtained, and the lock could be located and opened by pulling information directly from the company's API server. This indicates a failure in the operation or handling of the software system, allowing unauthorized access to the lock [69856].
Boundary (Internal/External) within_system (a) The software failure incident related to the Tapplock One padlock can be categorized as within_system. The incident involved security flaws in both the physical and software aspects of the lock. Security researchers pointed out issues with the digital security of the Tapplock One, including vulnerabilities that allowed attackers to obtain sensitive information, locate and open the lock by pulling information directly from the company's API server [69856]. Additionally, the company was working on solving these security issues with a firmware update [69856]. These issues were internal to the system and required software updates to address them.
Nature (Human/Non-human) non-human_actions (a) The software failure incident in the Tapplock One padlock was primarily due to non-human actions, specifically design flaws and security vulnerabilities in the physical and software components of the lock. Security researchers identified issues such as the ability to twist off the back plate and disassemble the lock with a standard screwdriver, as well as vulnerabilities in the digital security of the lock [69856]. These factors were introduced during the design and development of the product, leading to the software failure incident.
Dimension (Hardware/Software) hardware, software (a) The software failure incident occurring due to hardware: - The Tapplock One faced security issues related to both physical and software aspects. Security researchers pointed out physical and software security issues with the Tapplock One, indicating a potential design flaw that allowed attackers to disassemble the lock using a standard screwdriver [69856]. - The Tapplock One's hardware components, such as the fingerprint reader and the body made of zinc alloy, were part of the overall security features of the padlock [69856]. (b) The software failure incident occurring due to software: - The Tapplock One experienced major digital security issues, with security researchers finding vulnerabilities that allowed anyone to obtain sensitive information, locate, and open the lock by pulling information directly from the company's API server [69856]. - The company behind Tapplock was working on solving security issues with a firmware update to address the software vulnerabilities [69856].
Objective (Malicious/Non-malicious) malicious (a) The software failure incident reported in Article 69856 is related to a malicious objective. Security researchers pointed out physical and software security issues with the Tapplock One, including vulnerabilities that could allow an attacker to twist off the back plate and disassemble the lock using a standard screwdriver. Additionally, it was found that sensitive information could be obtained, and the lock could be located and opened by pulling information directly from the company's API server. These issues indicate a malicious intent to exploit security weaknesses in the system [69856].
Intent (Poor/Accidental Decisions) poor_decisions, accidental_decisions The software failure incident related to the Tapplock One padlock can be attributed to both poor decisions and accidental decisions. 1. Poor Decisions: The incident involved security researchers pointing out physical and software security issues with the Tapplock One, leading to concerns about its security flaws and questions about physical durability [Article 69856]. Additionally, the company faced criticism for allowing sensitive information to be obtained, and for the ability to locate and open the lock by pulling information directly from the company's API server, indicating potential poor decisions in the design and implementation of the software. 2. Accidental Decisions: The incident also involved unintended consequences such as the vulnerability of the Tapplock One to the suction cup trick, which was not initially confirmed but later tested and confirmed by the company [Article 69856]. This vulnerability could be seen as an accidental oversight in the design and testing of the product, leading to a potential software failure incident. Therefore, the software failure incident involving the Tapplock One padlock appears to have elements of both poor decisions and accidental decisions contributing to the failure.
Capability (Incompetence/Accidental) development_incompetence, unknown (a) The software failure incident related to development incompetence is evident in the case of the Tapplock One. Security researchers pointed out physical and software security issues with the Tapplock One, leading to concerns about its security flaws and questions about physical durability [69856]. Additionally, the company faced criticism for allowing an attacker to twist off the back plate and disassemble the lock using a standard screwdriver, indicating a design flaw that could have been prevented with better professional competence during the development process. (b) The accidental software failure incident is not explicitly mentioned in the provided article.
Duration temporary The software failure incident related to the Tapplock One was temporary. The incident involved security flaws in both the physical and software aspects of the lock, leading to vulnerabilities that allowed attackers to disassemble the lock and obtain sensitive information, locate, and open the lock [69856]. The company responded to these security issues by working on firmware updates to address the vulnerabilities and rolling out updates to solve the security problems. Additionally, the Tapplock One was no longer available for purchase directly through Amazon until the security issues were fully resolved.
Behaviour value, other (a) crash: The articles do not mention any specific instance of the software crashing and losing its state, leading to a failure. (b) omission: The articles do not mention any instance where the software omitted to perform its intended functions at an instance(s). (c) timing: The articles do not mention any failure related to the system performing its intended functions too late or too early. (d) value: The software failure incident mentioned in the articles is related to the system performing its intended functions incorrectly. Security researchers pointed out physical and software security issues with the Tapplock One, including vulnerabilities that allowed attackers to disassemble the lock easily and obtain sensitive information from the company's API server [69856]. (e) byzantine: The articles do not describe the software failure incident as exhibiting inconsistent responses or interactions, characteristic of a byzantine failure. (f) other: The software failure incident described in the articles involves security flaws and questions about physical durability of the Tapplock One, leading to the recommendation against using the lock in its current version. The failure is primarily related to security vulnerabilities and flaws in the software and physical design of the lock [69856].

IoT System Layer

Layer Option Rationale
Perception sensor, embedded_software (a) sensor: The Tapplock One padlock includes a fingerprint reader as one of its methods of entry. This sensor is a critical component of the lock's security system. [69856] (e) embedded_software: The Tapplock One's digital security was reported to have major issues, with security researchers finding vulnerabilities that allowed sensitive information to be obtained and the lock to be opened by pulling information directly from the company's API server. The company was working on solving these security issues with a firmware update. [69856]
Communication unknown Unknown
Application TRUE The software failure incident related to the Tapplock One was primarily due to security flaws in both the physical and software aspects of the product. Security researchers pointed out issues with the Tapplock One, including the ability for an attacker to twist off the back plate and disassemble the lock using a standard screwdriver, as well as vulnerabilities in the digital security of the lock. Additionally, it was found that sensitive information could be obtained, and the lock could be located and opened by pulling information directly from the company's API server [69856]. These issues indicate that the failure was indeed related to the application layer of the cyber physical system, as it involved security vulnerabilities and flaws in the software aspect of the product.

Other Details

Category Option Rationale
Consequence unknown The articles do not mention any specific consequence of the software failure incident related to the Tapplock One padlock. Therefore, the consequence of the software failure incident is 'unknown'.
Domain information (a) The Tapplock One software failure incident is related to the information industry as it involves a smart padlock that offers multiple ways to unlock using Bluetooth, fingerprint, and Morse code [Article 69856].

Sources

Back to List