BASE

High-Security Safes Have a Critical Vulnerability — Here's How Researchers Opened One With a Smartphone

2026-01-21濱本 隆太

Hacker researchers James Rowley and Mark Omo demonstrated two methods for opening widely-deployed SECURAM digital locks in seconds: the Reset-Heath Attack (using a smartphone app to compute a reset response code) and the Code-Snatch Attack (accessing a debug port in the battery compartment to extract the super code). The same vulnerabilities affect Liberty Safe, FortKnox, High Noble, Fire-King, Prosteel, and Rhino Metal products. SECURAM has stated it will not issue a firmware update.

High-Security Safes Have a Critical Vulnerability — Here's How Researchers Opened One With a Smartphone
シェア

The Safe That Isn't Safe

Most people believe that high-security safes with the latest electronic controls provide reliable protection for firearms, cash, and medications. Hacker researchers James Rowley and Mark Omo have demonstrated that this belief is not warranted — at least for safes using SECURAM digital locks, which are among the most widely deployed in the world. Their technique opens these locks in seconds.

This article covers both methods they demonstrated: the Reset-Heath Attack (unlocking with a smartphone and no tools), and the Code-Snatch Attack (extracting the internal super code from a debug port). It examines what these vulnerabilities mean for the millions of safes currently in use, and why the manufacturer's response — no firmware update, buy a new product — is inadequate.

  • The false security: design backdoors built into widely-deployed locks
  • The Reset-Heath Attack: opening a safe with just a smartphone
  • The Code-Snatch Attack: extracting the master code from a battery compartment
  • Summary

Looking to optimize community management?

We have prepared materials on BASE best practices and success stories.

The False Security: Design Backdoors in Widely-Deployed Locks

High-security products create strong expectations of impenetrability. The research findings make clear that those expectations are not met by current SECURAM digital locks. The core problem is a designed backdoor: a reset function built into the lock so that locksmiths and manufacturer support can restore access when a user forgets their passcode. This is a legitimate operational need. But the mechanism implementing it has been left in a state that anyone with sufficient knowledge can exploit.

The brands affected extend well beyond SECURAM products sold directly. Liberty Safe, FortKnox, High Noble, Fire-King, Prosteel, and Rhino Metal — products widely distributed across the U.S. and globally — all share this vulnerability. The researchers tested multiple ProLogic locks purchased from eBay and confirmed that every unit exhibited the same flaw. If an attacker acquires this technique, the risk is not limited to a single compromised product: it scales across the full installed base of these products.

Security experts have long been aware that "backdoor" functionalities create exploitable risk profiles. The reset function embedded in these locks exists as an intended operational feature of the manufacturer — correctly used, it is not a problem. The problem is that the reset mechanism operates on factory-default settings, users are not informed of this, and there is no mechanism compelling them to change the relevant settings. The result: most safes in actual use remain in the vulnerable default state indefinitely.

The vulnerability implications reach beyond consumer safety. Liberty Safe provided the FBI with access codes for a safe during an investigation — a case that illustrates both the law enforcement utility of this mechanism and the risk that the same capability could be exploited maliciously. Consumer trust in security products is deeply affected when those products are revealed to have accessible backdoors. Manufacturers must now reckon with both security design and risk management.

The discovery also demonstrates that proprietary knowledge — "trade secrets" known only to locksmiths and a narrow circle of insiders — can be acquired and disseminated by researchers willing to analyze firmware directly. Once that knowledge is public, the security model that depended on obscurity collapses. Security through obscurity was always a weak guarantee. It is now demonstrably insufficient.

The Reset-Heath Attack: Opening a Safe With Just a Smartphone

The Reset-Heath Attack is the most accessible of the two methods. Mark Omo and James Rowley identified the core mechanism of the reset function built into SECURAM's ProLogic lock and developed a smartphone application that can compute the required response code on demand.

The attack sequence begins with entering the lock's reset mode. The attacker enters a recovery code — all nines — which causes the lock to display a challenge code. This challenge code is generated by a pre-programmed algorithm within the lock's firmware. The factory-default state of the lock is configured so that after a successful reset, the passcode "1111" becomes valid. The research team's smartphone application computes the correct response code from the displayed challenge code in seconds. Entering that response code resets the lock completely: all registered user data is deleted and factory defaults are restored. The safe can then be opened with the default code.

The technical backbone of this attack was firmware analysis. The researchers reverse-engineered the lock's firmware completely — exposing the encryption scheme for internal data and the code generation process. These components, once understood, can be replicated by anyone with the relevant technical skills. The researchers estimate that a competent engineer could build the necessary tool independently in approximately one week.

The demonstration was striking precisely because of its simplicity. No specialized physical tools. No drilling. No destructive entry. A smartphone and a custom application — and the lock resets. The audience response at the demonstration was described as shock at how straightforward the process appeared.

The broader implication is important: the reset function was not a design error in the conventional sense. It was an intended feature, designed for a specific operational purpose, implemented in a way that was never intended to be public knowledge. The problem is not that the feature exists — it is that the factory-default security posture leaves virtually every deployed unit in a state where this attack works, and that there is no manufacturer-driven mechanism to change this.

The appropriate near-term mitigation for users of affected products is to change the reset function's security configuration from factory defaults — a step that requires active action on the user's part, and that most users have not taken because they were never told it was necessary. SECURAM's stated response — no firmware update, new products for customers who want security — does not address the installed base.

The Code-Snatch Attack: Extracting the Master Code From a Battery Compartment

The Code-Snatch Attack goes further. Where the Reset-Heath Attack exploits the reset mechanism to restore factory defaults, the Code-Snatch Attack extracts the lock's internal "super code" — the master override code — directly from the hardware.

The researchers accessed the debug port located inside the lock's battery compartment. Debug ports are standard in embedded systems during development: they allow engineers to inspect and modify device state during testing and manufacturing. In a product that has shipped to end users, this port should be closed or physically disabled. In SECURAM's ProLogic lock, it is not.

The attack sequence: open the battery compartment door, locate the programming port inside, insert a custom-built small device. The device is a minimal computer with a display, purpose-built to interface with the lock's microcontroller. When connected, it reads out all stored code information from the lock's internal memory — including the encrypted super code and, simultaneously, the decryption key needed to interpret it. The super code appears on the device's display. The safe opens immediately.

The most significant concern with this attack is cost and accessibility. The components are commodity hardware, readily available, and inexpensive. The researchers have not published full construction details, but they state that the barrier to reproducing this attack is low for anyone with moderate electronics knowledge. The attack requires physical access to the battery compartment — which is accessible from outside the safe — making it a realistic threat in real-world scenarios.

SECURAM has acknowledged that the super code is stored in the lock's keypad component rather than in the safe body itself, and that this design choice leaves it physically accessible. The manufacturer has stated that a correction to this design should have placed sensitive storage inside the locked portion of the safe rather than in the externally accessible keypad housing. This acknowledgment does not come with a remedy for existing products.

The manufacturer's response to both vulnerabilities — release new products — means that the installed base of currently deployed locks will not receive a fix. Users who own affected products are exposed to both attack vectors indefinitely unless they take independent action. The absence of a firmware update path — or any other manufacturer-provided remediation — is a significant failure of post-sale security responsibility.

Summary

The two attack methods demonstrated by Rowley and Omo — the Reset-Heath Attack and the Code-Snatch Attack — collectively overturn the assumption that high-security safes with digital locks are reliably secure. The reset function backdoor exploited by the Reset-Heath Attack is a design feature left in factory-default state across millions of deployed units. The debug port exploited by the Code-Snatch Attack is an engineering convenience that was never disabled before products shipped to consumers.

Both attacks require no specialized knowledge to understand: the first uses a smartphone application; the second uses inexpensive commodity hardware. Both affect products from Liberty Safe, FortKnox, High Noble, Fire-King, Prosteel, Rhino Metal, and others — all using the same vulnerable SECURAM lock.

The response from SECURAM — no firmware update, buy new products — leaves the full existing installed base in a vulnerable state. Users who own these products should not assume that their safes provide the security they believe they do. The minimum reasonable action is to review and modify the reset function default settings of any affected product currently in use.

The broader lesson the research illustrates is the one that security professionals have argued consistently: absolute security is an illusion, and any product that treats its security model as permanent — rather than as something requiring ongoing maintenance and update — will eventually be demonstrated to be less secure than users believed. The appropriate response for manufacturers is to design for security maintenance from the start: firmware update capability, proactive vulnerability disclosure programs, and post-sale security communication with customers. The failure to do these things is what converted a designed feature into a broadly exploitable vulnerability.

Reference: https://www.youtube.com/watch?v=upVzWfokDQc


Streamline Event Management with AI | TIMEWELL Base

Struggling to manage large-scale events?

TIMEWELL Base is an AI-powered event management platform.

Track Record

  • Adventure World: Managed Dream Day with 4,272 attendees
  • TechGALA 2026: Centralized management of 110 side events

Key Features

Feature Benefit
AI Page Generation Event pages ready in 30 seconds
Low-Cost Payments 4.8% transaction fee (among the lowest in the industry)
Community Features 65% of attendees continue networking after events

Feel free to reach out to discuss streamlining your event operations.

Book a Free Consultation →

Want to measure your community health?

Visualize your community challenges in 5 minutes. Analyze engagement, growth, and more.

Share this article if you found it useful

シェア

Newsletter

Get the latest AI and DX insights delivered weekly

Your email will only be used for newsletter delivery.

無料診断ツール

あなたのコミュニティは健全ですか?

5分で分かるコミュニティ健全度診断。運営の課題を可視化し、改善のヒントをお届けします。

Learn More About BASE

Discover the features and case studies for BASE.