β€ŽIs SimpliSafe Hackable? | SimpliSafe Support Home
 
miketjthomas's profile

Monday, March 10th, 2025 10:21 AM

Is SimpliSafe Hackable?

It would seem that a backdoor has been found in the ubiquitous ESP32 microchip made by Chinese manufacturer Espressif and installed in SimpliSafe.  Undocumented commands that could be leveraged for attacks were found buried in the OS code. Are SimpliSafe going to follow up with these findings and ensure our security systems are safe from hackers (foreign or domestic)?

Official Solution

Community Admin

Β β€’Β 

1.2K Messages

17 days ago

As part of our commitment to our customers, we take matters of privacy and cybersecurity very seriously. We’ve been following the recent news regarding undocumented debug commands in Espressif microcontrollers and don’t view what has been reported as a threat to our current security system. As noted in Espressif’s response earlier today, the commands are used locally within a particular device, with no remote access. Per Espressif’s response, the commands “cannot be triggered by Bluetooth, radio signals, or over the Internet, meaning they do not pose a risk of remote compromise of [relevant] devices.”

Beyond Espressif’s response, it’s important to note that the Bluetooth module in our system is only used in onboarding the system and has limited functionality even in that process. It isn’t used for arming and disarming the SimpliSafe® system. Overall, SimpliSafe® has robust protections in place within and around our products to provide further protection.


While we were aware of this news, we appreciate you raising it and encourage anyone who may suspect a vulnerability in the future to submit their findings to our security team following the steps outlined in our article How do I report a possible security issue in the system?

Captain

Β β€’Β 

6.3K Messages

17 days ago

First, I am not a programmer or security expert, so when I read a post on whether SS is safe or not from attacks, I take a wait and see approach to see what SimpliSafe and others say about it. In the past we had the "Invisible Fence" vulnerability (pure garbage in my own personal testing" and the "$4 - now $8 - RFID fob / garage door" hack, which again in my own personal testing isn't a big threat (you can use the search tool and look up the specifics and my response).

For this one, I am first to admit way beyond my grade level to evaluate but here is an article, and related comments, on this subject:

https://www.bleepingcomputer.com/news/security/undocumented-commands-found-in-bluetooth-chip-used-by-a-billion-devices/

So, SimpliSafe, what is your response? For now, I will sleep soundly as I have a few other items to be concerned about.

1.5K Messages

17 days ago

Everything iOT is probably hackable or attackable.

Good security practices help prevent it.

Servers too without said security. Happens all the time to better than this hardware.

If an RCE (remote code execution) is possible and it may or may not be possible. Just left over junk in the ESP32, &or, expressif devices? Maybe.

The hack, if any, would probably be on the server side where something like malware pay locks would be very profitable to hackers vs stealing our credit card #'s or petty hacker crime.

Imagine what would happen if say all SS users got locked out of their services. Very Messy.

Expressif is said to have at least 20 or 30 vulnerabilities.

I don't expect much of a response, it's being discussed all over the internet amd social media though. Plenty to read there.

In order to get to the chip, it'd almost require a penetration of your LAN or server side. Unless time based.πŸ˜‰

X was just hit today with a cyber attack so there's the possibility of anything if you tick off the wrong group of people or foreign states as Musk supposedly has.

754 Messages

17 days ago

"Imagine what would happen if say all SS users got locked out of their services. Very Messy."

I don't know that this kind of response in a thread like this, where people are concerned, is the way to go. :) I'm all for creative thinking and thought exercises but not in a thread where people are looking for concrete information.

As the simplisafe_admin account noted when referencing the espressif response, you basically need physical access to the base station to take advantage of this "vulnerability". If a bad actor has their hands on your base station then this flaw is the least of your worries. :)

1.5K Messages

@worthing​ Your entitled to your opinion, just as I am. And I'll expressif it.πŸ€”πŸ˜‰ Whether you agree with it or not. You've stated yours and your opposing views.

One person asked a question, not people.

I don't personally believe there is a security concern even if the left behind host controller interface backdoors or features, whichever is the case, or even if it was for nefarious purposes from China.

Likely sloppy coding or internal access for updates where feasible.

The expressif device used for "onboarding" has shown up either on cell phones Bluetooth and/or user WiFi routers via Simplisafes base station several times, which?, memory fails me, but it is evidenced here in this forum, if anyone cares to search and if the posts still exist.

Since Simplisafe is a closed system, I suppose we'll never know. Points at weak Firmware IMHO or perhaps device build deficiencies. They're what, $2 each or less for an OEM.

The Esp32 wroom 32 device serves up onboarding perhaps and Wi-Fi. It's long had some vulnerabilities, such as EMFI attacks, well documented at NIST etc. (And may be dependent upon firmware versions or patches) I'd think they can't be patched in these devices once installed.

The Simplisafe Esp32 wroom 32 rest on the opposite side of the radio board, from the sub 1ghz RF radio for sensor communications. Vulnerabilities? Probably. Security risk? Doubtful.

I have no personal concerns regardless.

If I made the OP uncomfortable, perhaps this will straighten it out or make it worse.🀷

SimpliSafe Logo
New to the Community? Get started by reading our Welcome Article and please be sure to review our Community Guidelines before posting.