"Next-Gen OSDP Was Supposed to Make It Harder to Break in to Secure Facilities. It Failed."

Researchers have uncovered a set of vulnerabilities that compromise a next-generation protocol designed to prevent the hacking of access control systems used at secure facilities on US military bases and buildings owned by federal, state, and local governments as well as private entities. The next-generation mechanism, Secure Channel, was introduced to the open standard, Open Supervised Device Protocol (OSDP), about ten years ago. Similar to the Wiegand protocol, OSDP provides a framework for connecting card readers, fingerprint scanners, and other peripheral devices to control interfaces that compare the collected credentials with a database of valid personnel. When credentials match, the control panel sends a message to open a door, gate, or other entry system. This article continues to discuss the OSDP Secure Channel. 

Ars Technica reports "Next-Gen OSDP Was Supposed to Make It Harder to Break in to Secure Facilities. It Failed."

Submitted by Anonymous on