← Advisories

Ksenia Security Lares WebServer Home Automation PIN Logic Flaw

High
Advisory ID
ZSL-2025-5929
Release Date
31 March 2025
Vendor
Ksenia Security S.p.A. - https://www.kseniasecurity.com
Affected Version
Firmware version 1.6, Webserver version 1.0.0.15
Tested On
Ksenia Lares Webserver
Summary

Lares is a burglar alarm & home automation system that can be controlled by means of an ergo LCD keyboard, as well as remotely by telephone, and even via the Internet through a built-in WEB server.

Description

The Ksenia home automation and burglar alarm system has a security flaw where the PIN required to disable the alarm is exposed in the 'basisInfo' XML file after initial authentication, allowing attackers who gain access to this file to bypass security measures. This design flaw enables unauthorized individuals to both disable the alarm system and manipulate smart home devices by simply retrieving the PIN from the server response, effectively rendering the security system useless since the supposedly secret PIN is easily obtainable once an attacker reaches the authenticated state. The system should never expose sensitive codes in API responses and should implement proper multi-factor authentication for critical functions like alarm deactivation.

Proof of Concept
Disclosure Timeline
03.07.2024Vulnerability discovered.
27.09.2024Vendor contacted.
30.03.2025No response from the vendor.
31.03.2025Public security advisory released.
11.02.2026Vendor clarifies that this is not affecting lares 4.0, only the legacy lares model.
Credits
Vulnerability discovered by Mencha Isajlovska
References
Changelog
31.03.2025Initial release
11.02.2026Added reference [1]
11.02.2026Changed the title of the advisory and added Vendor Status.