CVE-2019-9659
📋 TL;DR
This vulnerability affects Chuango and other branded 433 MHz burglar alarm systems that use static codes in their RF remote controls. Attackers can capture and replay these codes to remotely arm, disarm, or trigger alarms without authorization. This impacts all users of affected alarm systems regardless of configuration.
💻 Affected Systems
- Chuango 433 MHz burglar-alarm product line
- Eminent EM8617 OV2 Wifi Alarm System
- Other non-Chuango branded products using same RF protocol
📦 What is this software?
A11 Pstn\/lcd\/rfid Touch Alarm System Firmware by Chuango
View all CVEs affecting A11 Pstn\/lcd\/rfid Touch Alarm System Firmware →
Awv Plus Wifi Alarm System Firmware by Chuango
View all CVEs affecting Awv Plus Wifi Alarm System Firmware →
B11 Dual Network Alarm System Firmware by Chuango
View all CVEs affecting B11 Dual Network Alarm System Firmware →
Cg 105s On Site Alarm System Firmware by Chuango
View all CVEs affecting Cg 105s On Site Alarm System Firmware →
Em8617 Ov2 Wifi Alarm System Firmware by Eminent
View all CVEs affecting Em8617 Ov2 Wifi Alarm System Firmware →
G3 Gsm\/sms Alarm System Firmware by Chuango
⚠️ Risk & Real-World Impact
Worst Case
Attackers could disarm security systems during break-ins, trigger false alarms causing panic or desensitization, or prevent legitimate alarm activation during actual emergencies.
Likely Case
Unauthorized disarm/arm of alarm systems, false alarm triggering, and potential burglary facilitation through security system bypass.
If Mitigated
With proper physical security controls and monitoring, impact is limited to nuisance alarms and minor security breaches.
🎯 Exploit Status
Attack requires RF signal capture equipment (SDR or similar) but is straightforward once codes are captured. No authentication or network access needed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: N/A
Vendor Advisory: N/A
Restart Required: No
Instructions:
No official patch available. Hardware/firmware redesign required to implement rolling codes or encryption.
🔧 Temporary Workarounds
Physical Security Enhancement
allImplement additional physical security layers to compensate for RF vulnerability
RF Signal Monitoring
allDeploy RF monitoring to detect replay attacks
🧯 If You Can't Patch
- Replace affected alarm systems with models using rolling codes or encrypted RF communication
- Implement secondary security systems (cameras, motion sensors) that don't rely on vulnerable RF controls
🔍 How to Verify
Check if Vulnerable:
Check if alarm system uses 433 MHz RF remote with static codes. Test by capturing and replaying RF signals with SDR equipment.
Check Version:
N/A - hardware/firmware issue, not version dependent
Verify Fix Applied:
Verify new system uses rolling codes or encryption by testing RF signal replay resistance.
📡 Detection & Monitoring
Log Indicators:
- Multiple rapid arm/disarm events
- Alarm triggers without corresponding sensor activation
- Unusual timing of control commands
Network Indicators:
- N/A - RF based attack, not network dependent
SIEM Query:
N/A - RF based attack outside typical SIEM monitoring scope