Security vulnerabilities found in Guardzilla wireless security systems


In December 2018, the security researchers at 0DayAllDay discovered that the encryption keys hard-coded into the firmware inside the Guardzilla indoor wireless security system were protected by a ten-year-old, easily cracked algorithm. Because all the devices used the same keys, anyone could use the keys to log into the company's Amazon-hosted storage service and gain access to the customer data uploaded there. Although the researchers had notified the company in September, they had received no response.
Writer: Zack Whittaker
Publication: TechCrunch

Related learning resources