{"id":3480,"date":"2024-08-29T10:49:20","date_gmt":"2024-08-29T08:49:20","guid":{"rendered":"https:\/\/www.tec4net.com\/web\/?p=3480"},"modified":"2024-09-13T15:32:54","modified_gmt":"2024-09-13T13:32:54","slug":"30649","status":"publish","type":"post","link":"https:\/\/www.tec4net.com\/web\/2024\/08\/29\/30649\/","title":{"rendered":"Schwachstelle in RFID-Schl\u00fcsselkarten entdeckt: Backdoor erlaubt Klonen"},"content":{"rendered":"<p>Sicherheitsforscher von Quarkslab haben in RFID-Schl\u00fcsselkarten des Herstellers Fudan Microelectronics eine Backdoor entdeckt. Diese Schwachstelle erm\u00f6glicht das einfache Klonen von Schl\u00fcsselkarten, die in vielen Hotels und B\u00fcros weltweit verwendet werden. Die betroffenen Karten sind mit Mifare-Classic-Karten von NXP Semiconductors kompatibel, die bereits in der Vergangenheit anf\u00e4llig f\u00fcr Angriffe waren.<\/p>\n<p>Die Forscher fanden heraus, dass der auf den Karten verwendete geheime Schl\u00fcssel identisch ist, wodurch alle Karten schnell kompromittiert werden k\u00f6nnen. \u00c4ltere Modelle von NXP und Infineon zeigen \u00e4hnliche Schwachstellen. Ein Umstieg auf sicherere Systeme wird dringend empfohlen.<\/p>\n<p><strong>Quelle:<\/strong><br \/>\n<a href=\"https:\/\/www.golem.de\/news\/zutrittskontrolle-unzaehlige-rfid-schluesselkarten-mit-backdoor-ausgestattet-2408-188238.html\" target=\"_new\" rel=\"noopener\">https:\/\/www.golem.de\/news\/zutrittskontrolle-unzaehlige-rfid-schluesselkarten-mit-backdoor-ausgestattet-2408-188238.html<\/a><\/p>\n<p>Untersuchungen von Quarkslab &#8211; <a href=\"https:\/\/eprint.iacr.org\/2024\/1275.pdf\">https:\/\/eprint.iacr.org\/2024\/1275.pdf<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Wir sind Experten f\u00fcr Datenschutz und IT-Sicherheit<\/strong><\/p>\n<p>Profitieren Sie von unserer umfassenden Beratung zu den Themen Datenschutz und IT-Sicherheit. Unser erfahrenes Team unterst\u00fctzt Sie dabei, Ihre Website und digitalen Dienste datenschutzkonform zu gestalten um die gesetzlichen Vorgaben zu erf\u00fcllen.<\/p>\n<p>Kontaktieren Sie uns noch heute und sichern Sie sich praxisnahe Beratung zur Umsetzung der DSGVO und Normen wie ISO 27001, PCI-DSS oder TISAX.<\/p>\n<p><strong>Datenschutz und IT-Sicherheit praktikabel umsetzen &#8211; tec4net GmbH<\/strong><\/p>\n<hr \/>\n<p><a href=\"https:\/\/www.tec4net.com\">www.tec4net.com<\/a> \u2013 <a href=\"https:\/\/www.it-news-blog.com\">www.it-news-blog.com<\/a> \u2013 <a href=\"https:\/\/www.it-sachverstand.info\">www.it-sachverstand.info<\/a> \u2013 <a href=\"https:\/\/www.datenschutz-muenchen.com\">www.datenschutz-muenchen.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Sicherheitsforscher von Quarkslab haben in RFID-Schl\u00fcsselkarten des Herstellers Fudan Microelectronics eine Backdoor entdeckt. Diese Schwachstelle erm\u00f6glicht das einfache Klonen von Schl\u00fcsselkarten, die in vielen Hotels und B\u00fcros weltweit verwendet werden. Die betroffenen Karten sind mit Mifare-Classic-Karten von NXP Semiconductors kompatibel, die bereits in der Vergangenheit anf\u00e4llig f\u00fcr Angriffe waren. Die [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[1156,1155,1161,1158,1157,1160,1159],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Schwachstelle in RFID-Schl\u00fcsselkarten entdeckt: Backdoor erlaubt Klonen - tec4net<\/title>\n<meta name=\"description\" content=\"Unsere IT-Experten beraten Sie im Bereich Consulting, IT-Security und Datenschutz in M\u00fcnchen | tec4net GmbH - seit 2003\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tec4net.com\/web\/2024\/08\/29\/30649\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Schwachstelle in RFID-Schl\u00fcsselkarten entdeckt: Backdoor erlaubt Klonen - tec4net\" \/>\n<meta property=\"og:description\" content=\"Unsere IT-Experten beraten Sie im Bereich Consulting, IT-Security und Datenschutz in M\u00fcnchen | tec4net GmbH - seit 2003\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tec4net.com\/web\/2024\/08\/29\/30649\/\" \/>\n<meta property=\"og:site_name\" content=\"tec4net\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-29T08:49:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-13T13:32:54+00:00\" \/>\n<meta name=\"author\" content=\"Matthias Walter\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Matthias Walter\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"1\u00a0Minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.tec4net.com\/web\/2024\/08\/29\/30649\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.tec4net.com\/web\/2024\/08\/29\/30649\/\"},\"author\":{\"name\":\"Matthias Walter\",\"@id\":\"https:\/\/www.tec4net.com\/web\/#\/schema\/person\/eb2c0c81b5ce5b0320d91188184d409b\"},\"headline\":\"Schwachstelle in RFID-Schl\u00fcsselkarten entdeckt: Backdoor erlaubt Klonen\",\"datePublished\":\"2024-08-29T08:49:20+00:00\",\"dateModified\":\"2024-09-13T13:32:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.tec4net.com\/web\/2024\/08\/29\/30649\/\"},\"wordCount\":209,\"publisher\":{\"@id\":\"https:\/\/www.tec4net.com\/web\/#organization\"},\"keywords\":[\"DSGVO Datenschutzberatung f\u00fcr Firmen in M\u00fcnchen\",\"ISO 27001 IT-Sicherheitsberatung in M\u00fcnchen\",\"Mifare Classic und Backdoor-Schwachstellen\",\"Mifare Classic: Klonen von RFID-Karten verhindern\",\"RFID-Karten mit Backdoor: Sicherheitsrisiko im Blick\",\"RFID-Schl\u00fcsselkarten sicher gegen Klonen machen\",\"Sicherheitsl\u00fccke bei NXP und Fudan Microelectronics\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tec4net.com\/web\/2024\/08\/29\/30649\/\",\"url\":\"https:\/\/www.tec4net.com\/web\/2024\/08\/29\/30649\/\",\"name\":\"Schwachstelle in RFID-Schl\u00fcsselkarten entdeckt: Backdoor erlaubt Klonen - tec4net\",\"isPartOf\":{\"@id\":\"https:\/\/www.tec4net.com\/web\/#website\"},\"datePublished\":\"2024-08-29T08:49:20+00:00\",\"dateModified\":\"2024-09-13T13:32:54+00:00\",\"description\":\"Unsere IT-Experten beraten Sie im Bereich Consulting, IT-Security und Datenschutz in M\u00fcnchen | tec4net GmbH - seit 2003\",\"breadcrumb\":{\"@id\":\"https:\/\/www.tec4net.com\/web\/2024\/08\/29\/30649\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tec4net.com\/web\/2024\/08\/29\/30649\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tec4net.com\/web\/2024\/08\/29\/30649\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/www.tec4net.com\/web\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Schwachstelle in RFID-Schl\u00fcsselkarten entdeckt: Backdoor erlaubt Klonen\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tec4net.com\/web\/#website\",\"url\":\"https:\/\/www.tec4net.com\/web\/\",\"name\":\"tec4net\",\"description\":\"Ihr starker IT-Partner\",\"publisher\":{\"@id\":\"https:\/\/www.tec4net.com\/web\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tec4net.com\/web\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.tec4net.com\/web\/#organization\",\"name\":\"tec4net\",\"url\":\"https:\/\/www.tec4net.com\/web\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.tec4net.com\/web\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.tec4net.com\/web\/wp-content\/uploads\/2018\/12\/t4n_Logo_startseite.png\",\"contentUrl\":\"https:\/\/www.tec4net.com\/web\/wp-content\/uploads\/2018\/12\/t4n_Logo_startseite.png\",\"width\":178,\"height\":163,\"caption\":\"tec4net\"},\"image\":{\"@id\":\"https:\/\/www.tec4net.com\/web\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tec4net.com\/web\/#\/schema\/person\/eb2c0c81b5ce5b0320d91188184d409b\",\"name\":\"Matthias Walter\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.tec4net.com\/web\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c8945f23c3708dc375c12592ec9c9a7e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c8945f23c3708dc375c12592ec9c9a7e?s=96&d=mm&r=g\",\"caption\":\"Matthias Walter\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Schwachstelle in RFID-Schl\u00fcsselkarten entdeckt: Backdoor erlaubt Klonen - tec4net","description":"Unsere IT-Experten beraten Sie im Bereich Consulting, IT-Security und Datenschutz in M\u00fcnchen | tec4net GmbH - seit 2003","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tec4net.com\/web\/2024\/08\/29\/30649\/","og_locale":"de_DE","og_type":"article","og_title":"Schwachstelle in RFID-Schl\u00fcsselkarten entdeckt: Backdoor erlaubt Klonen - tec4net","og_description":"Unsere IT-Experten beraten Sie im Bereich Consulting, IT-Security und Datenschutz in M\u00fcnchen | tec4net GmbH - seit 2003","og_url":"https:\/\/www.tec4net.com\/web\/2024\/08\/29\/30649\/","og_site_name":"tec4net","article_published_time":"2024-08-29T08:49:20+00:00","article_modified_time":"2024-09-13T13:32:54+00:00","author":"Matthias Walter","twitter_card":"summary_large_image","twitter_misc":{"Verfasst von":"Matthias Walter","Gesch\u00e4tzte Lesezeit":"1\u00a0Minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.tec4net.com\/web\/2024\/08\/29\/30649\/#article","isPartOf":{"@id":"https:\/\/www.tec4net.com\/web\/2024\/08\/29\/30649\/"},"author":{"name":"Matthias Walter","@id":"https:\/\/www.tec4net.com\/web\/#\/schema\/person\/eb2c0c81b5ce5b0320d91188184d409b"},"headline":"Schwachstelle in RFID-Schl\u00fcsselkarten entdeckt: Backdoor erlaubt Klonen","datePublished":"2024-08-29T08:49:20+00:00","dateModified":"2024-09-13T13:32:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.tec4net.com\/web\/2024\/08\/29\/30649\/"},"wordCount":209,"publisher":{"@id":"https:\/\/www.tec4net.com\/web\/#organization"},"keywords":["DSGVO Datenschutzberatung f\u00fcr Firmen in M\u00fcnchen","ISO 27001 IT-Sicherheitsberatung in M\u00fcnchen","Mifare Classic und Backdoor-Schwachstellen","Mifare Classic: Klonen von RFID-Karten verhindern","RFID-Karten mit Backdoor: Sicherheitsrisiko im Blick","RFID-Schl\u00fcsselkarten sicher gegen Klonen machen","Sicherheitsl\u00fccke bei NXP und Fudan Microelectronics"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.tec4net.com\/web\/2024\/08\/29\/30649\/","url":"https:\/\/www.tec4net.com\/web\/2024\/08\/29\/30649\/","name":"Schwachstelle in RFID-Schl\u00fcsselkarten entdeckt: Backdoor erlaubt Klonen - tec4net","isPartOf":{"@id":"https:\/\/www.tec4net.com\/web\/#website"},"datePublished":"2024-08-29T08:49:20+00:00","dateModified":"2024-09-13T13:32:54+00:00","description":"Unsere IT-Experten beraten Sie im Bereich Consulting, IT-Security und Datenschutz in M\u00fcnchen | tec4net GmbH - seit 2003","breadcrumb":{"@id":"https:\/\/www.tec4net.com\/web\/2024\/08\/29\/30649\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tec4net.com\/web\/2024\/08\/29\/30649\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.tec4net.com\/web\/2024\/08\/29\/30649\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.tec4net.com\/web\/"},{"@type":"ListItem","position":2,"name":"Schwachstelle in RFID-Schl\u00fcsselkarten entdeckt: Backdoor erlaubt Klonen"}]},{"@type":"WebSite","@id":"https:\/\/www.tec4net.com\/web\/#website","url":"https:\/\/www.tec4net.com\/web\/","name":"tec4net","description":"Ihr starker IT-Partner","publisher":{"@id":"https:\/\/www.tec4net.com\/web\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tec4net.com\/web\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.tec4net.com\/web\/#organization","name":"tec4net","url":"https:\/\/www.tec4net.com\/web\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.tec4net.com\/web\/#\/schema\/logo\/image\/","url":"https:\/\/www.tec4net.com\/web\/wp-content\/uploads\/2018\/12\/t4n_Logo_startseite.png","contentUrl":"https:\/\/www.tec4net.com\/web\/wp-content\/uploads\/2018\/12\/t4n_Logo_startseite.png","width":178,"height":163,"caption":"tec4net"},"image":{"@id":"https:\/\/www.tec4net.com\/web\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.tec4net.com\/web\/#\/schema\/person\/eb2c0c81b5ce5b0320d91188184d409b","name":"Matthias Walter","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.tec4net.com\/web\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/c8945f23c3708dc375c12592ec9c9a7e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c8945f23c3708dc375c12592ec9c9a7e?s=96&d=mm&r=g","caption":"Matthias Walter"}}]}},"_links":{"self":[{"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/posts\/3480"}],"collection":[{"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/comments?post=3480"}],"version-history":[{"count":1,"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/posts\/3480\/revisions"}],"predecessor-version":[{"id":3503,"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/posts\/3480\/revisions\/3503"}],"wp:attachment":[{"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/media?parent=3480"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/categories?post=3480"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/tags?post=3480"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}