Incident: Kwikset Smartkey Locks Vulnerable to Hacking and Security Flaws

Published Date: 2013-08-03

Postmortem Analysis
Timeline 1. The software failure incident involving the Kwikset smartkey locks happened in 2013. [20886]
System 1. Kwikset smartkey locks [20886]
Responsible Organization 1. The researchers Marc Weber Tobias and Toby Bluzmanis were responsible for causing the software failure incident with the Kwikset smartkey locks [20886].
Impacted Organization 1. Homeowners and residential building owners who use Kwikset smartkey locks were impacted by the software failure incident [20886].
Software Causes unknown
Non-software Causes 1. Lack of physical security in the design of the Kwikset smartkey locks, allowing them to be easily opened with tools like a screwdriver and wire [20886].
Impacts 1. The software failure incident involving the Kwikset smartkey locks had a significant impact on the security of millions of homes and residential buildings worldwide, as the locks were easily opened with basic tools like a screwdriver and wire [20886].
Preventions 1. Conducting thorough security testing and penetration testing on the smartkey locks before releasing them to the market to identify vulnerabilities and weaknesses [20886]. 2. Implementing stronger physical design features in the locks to prevent easy manipulation with tools like screwdrivers and wires [20886]. 3. Responding promptly to complaints and feedback from security researchers and consumers regarding the security of the locks to address any potential issues before they are exploited [20886].
Fixes 1. Implementing a more secure lock design that can withstand various hacking techniques, such as screwdrivers and wires, to prevent unauthorized access [20886]. 2. Conducting a thorough review of the lock's security features and vulnerabilities to address any weaknesses in the design [20886]. 3. Providing a software update or patch to enhance the security of the smartkey locks and address the identified vulnerabilities [20886].
References 1. Marc Weber Tobias and Toby Bluzmanis, noted lock hackers [20886]

Software Taxonomy of Faults

Category Option Rationale
Recurring one_organization, multiple_organization The software failure incident related to the Kwikset smartkey locks being easily opened with a screwdriver and wire has happened again at multiple organizations. The incident involved the Kwikset smartkey locks, which were demonstrated to be insecure by two noted lock hackers at the Def Con hacker conference [20886]. The researchers showed that the locks could be compromised using various techniques, including using a screwdriver and a paper clip or a wire to open the locks easily within seconds. This incident highlights a recurring issue with the security of these locks, indicating a broader vulnerability in similar products across different organizations.
Phase (Design/Operation) design, operation (a) The software failure incident related to the design phase can be seen in the case of the Kwikset smartkey locks. The locks were designed with features such as a reprogrammable cylinder to allow owners to change the locks on the fly to any key, providing convenience for users. However, researchers demonstrated that the design of the locks was inherently insecure, as they could be easily opened in 15 seconds with a screwdriver and a paper clip due to the lock's lack of physical strength to block certain actions [20886]. (b) The software failure incident related to the operation phase can be observed in the misleading information provided to consumers by Kwikset regarding the security of their smartkey locks. Despite researchers demonstrating multiple ways to compromise the locks, technical support from Kwikset repeatedly assured customers that the locks were impervious to screwdrivers or wires, creating a false sense of security for users operating the locks [20886].
Boundary (Internal/External) within_system The software failure incident described in the article is related to the security vulnerability of Kwikset smartkey locks. The failure is primarily within the system as it involves a flaw in the design and implementation of the lock system itself. The researchers demonstrated various techniques to compromise the locks, highlighting inherent insecurities in the lock design [20886]. The failure is not attributed to external factors but rather to the internal design and functionality of the smartkey locks.
Nature (Human/Non-human) non-human_actions (a) The software failure incident in this case is primarily due to non-human actions, specifically the inherent design flaws in the Kwikset smartkey locks. The locks were found to be easily opened with tools like a screwdriver and wire, showcasing vulnerabilities in the lock design itself rather than due to human actions [20886].
Dimension (Hardware/Software) software (a) The software failure incident in this case is not directly related to hardware but rather to the design and security vulnerabilities of the Kwikset smartkey locks. The locks were found to be easily opened with a screwdriver and wire, demonstrating inherent insecurities in the lock design [20886]. (b) The software failure incident is primarily related to software design flaws in the Kwikset smartkey locks. The researchers were able to compromise the locks using various techniques that exploited vulnerabilities in the lock's software programming, such as reprogramming the lock with a new key and using tools to manipulate the lock's internal components [20886].
Objective (Malicious/Non-malicious) non-malicious The software failure incident described in the article is non-malicious. The failure of the Kwikset smartkey locks to provide the level of security advertised was due to design flaws and vulnerabilities identified by researchers Marc Weber Tobias and Toby Bluzmanis. These vulnerabilities allowed the locks to be easily opened using simple tools like a screwdriver and wire, contrary to the claims made by Kwikset about the locks' security features [20886].
Intent (Poor/Accidental Decisions) unknown The software failure incident described in the article does not directly relate to software or digital systems. Instead, it focuses on the physical security vulnerabilities of Kwikset smartkey locks. Therefore, the incident does not align with the options provided for the intent of the software failure incident.
Capability (Incompetence/Accidental) unknown The articles do not mention any software failure incident related to development incompetence or accidental factors.
Duration unknown The software failure incident described in the article does not directly relate to a temporary or permanent software failure. Instead, it focuses on the physical security vulnerabilities of Kwikset smartkey locks and how they can be easily compromised by using tools like screwdrivers and wires [20886].
Behaviour omission, value, other (a) crash: The articles do not mention any instances of the software crashing. (b) omission: The software failure incident is related to the omission of performing its intended functions. The Kwikset smartkey locks were designed to be secure and invulnerable to hacking, but researchers demonstrated that they could easily be opened with a screwdriver and wire, bypassing the security features [20886]. (c) timing: There is no indication in the articles that the software performed its intended functions too late or too early. (d) value: The software failure incident falls under the category of performing its intended functions incorrectly. Despite being marketed as secure and resistant to hacking, the Kwikset smartkey locks were shown to be easily compromised, indicating a failure in providing the intended security value [20886]. (e) byzantine: The software failure incident does not exhibit characteristics of a byzantine failure. (f) other: The other behavior exhibited in this software failure incident is a discrepancy between the advertised security features of the Kwikset smartkey locks and the actual vulnerability demonstrated by the researchers. This discrepancy misleads consumers into believing the locks are secure when they can be easily compromised [20886].

IoT System Layer

Layer Option Rationale
Perception None None
Communication None None
Application None None

Other Details

Category Option Rationale
Consequence property, theoretical_consequence (property) The software failure incident discussed in the article did not directly result in any physical harm or death to individuals. However, it had a significant impact on people's property security. The Kwikset smartkey locks, which were marketed as highly secure and invulnerable to hacking, were demonstrated to be easily opened with simple tools like a screwdriver and wire. This vulnerability compromised the security of millions of homes and residential buildings worldwide that used these locks, potentially putting people's property at risk [20886].
Domain construction The software failure incident reported in the article [20886] is related to the construction industry. The article discusses the vulnerability of Kwikset smartkey locks, which are widely used in homes and residential buildings. These locks are designed to provide security features for buildings, making them relevant to the construction industry.

Sources

Back to List