Security test: Access control systems are so easy to manipulate

This weekend, we managed to uncover significant security gaps in the access cards used in a hotel. This discovery sheds light on a widespread problem: although many companies and institutions use modern card readers, they neglect to regularly update their reading procedures. Often, replacing access cards is seen as too cumbersome or costly. The result? Outdated access cards remain in use, posing significant security risks. What is particularly worrying is that these vulnerabilities can be exploited with simple means.

A good example of this is the Flipper Zero – a device that looks like a toy at first glance, but actually has impressive capabilities. With this device, outdated cards and reading methods, such as Mifare Classic, can be read and copied in just three steps. This makes it possible to gain unauthorised access to protected areas.

An investigation by FutureZone shows the extent of this problem: according to the report, 3 million doors in 16,000 buildings worldwide that use access control systems from a well-known manufacturer are affected. You can find the full article here: FutureZone article.

However, we assume that these figures are just the tip of the iceberg. The actual number of compromised access control systems is likely to be significantly higher, as the problem is not limited to hotel systems and is not exclusive to one manufacturer.

What about the security of access control systems in our company?

Companies should regularly review their security infrastructure and ensure that it is up to date. Outdated systems offer attackers an easy way to gain access. It is our responsibility to take proactive measures to ensure the security of our access control systems. It is time to identify potential security gaps and critically scrutinise the technologies used. Only through regular updates and the use of modern, secure procedures can we ensure that unauthorised persons do not gain access to sensitive areas.

Peter Dupach

Security Consultant
Peter Dupach is your contact for all aspects of planning physical security and advises our customers online and on site.

Jetzt weiterlesen!

Security Compliance

NIS 2 and CER: How the delayed legal implementation in Germany is putting KRITIS operators under pressure

The resilience of our critical infrastructures (KRITIS) is at stake. While other EU countries have long since created facts, Germany is lagging alarmingly behind in the crucial implementation of European requirements for KRITIS security, in particular the NIS-2 and CER directives.

Fill The Gap, Security Consulting

FILL THE GAP – the new security podcast is here! 🎙

Security is complex - we help you to keep an overview. In FILL THE GAP, we talk to experts about current challenges, technological developments and real threat scenarios in the field of physical security!

Cyber Security, Management Consulting, Security Consulting

Security 2025: The top trends that no company can ignore

The security landscape is changing rapidly. To stay protected in the future, companies must focus on trends like OSINT, robotics, and Zero Trust by 2025. This article outlines the five key developments that you can’t ignore and a groundbreaking technology that could transform security.

Alternativ zum Formular können Sie uns auch eine E-Mail an info@concepture.de senden.

Instead of the form, you can also send us an email to info@concepture.de.