<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Physical-Security — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/physical-security/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 19 Mar 2026 22:15:35 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/physical-security/feed.xml" rel="self" type="application/rss+xml"/><item><title>Vulnerabilities in Paxton Net2 Access Control Units</title><link>https://feed.craftedsignal.io/briefs/2026-03-paxton-net2-vulns/</link><pubDate>Thu, 19 Mar 2026 22:15:35 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-paxton-net2-vulns/</guid><description>Vulnerabilities in Paxton Net2 Access Control Units (ACUs) could allow unauthorized remote access and control of secured doors, potentially affecting prisons and other high-security facilities.</description><content:encoded><![CDATA[<p>A Reddit post highlights potential vulnerabilities within Paxton Net2 Access Control Units (ACUs). While the specifics of the vulnerabilities are not detailed in the Reddit post itself, the linked article allegedly describes how these flaws can be exploited to remotely unlock doors controlled by the Net2 system, potentially impacting prisons or other facilities using this access control technology. The potential for remote exploitation raises significant concerns about physical security bypass. Defenders should investigate their exposure to this product and monitor for anomalous network activity to or from these devices.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable Paxton Net2 ACU connected to the network.</li>
<li>Attacker leverages an unspecified vulnerability to gain unauthorized access to the ACU.</li>
<li>Attacker authenticates or bypasses authentication on the ACU to gain control.</li>
<li>Attacker sends a command to the ACU to unlock a specific door.</li>
<li>The ACU executes the command, releasing the electronic lock on the door.</li>
<li>Attacker gains physical access through the unlocked door.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could lead to unauthorized physical access to secured areas. In a prison setting, this could enable escapes and security breaches. Other facilities, such as data centers or government buildings, could also be at risk. The number of affected facilities is unknown.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Investigate internal usage of Paxton Net2 ACUs and determine firmware versions.</li>
<li>Monitor network traffic to and from Net2 ACUs for unexpected communications, as highlighted in the overview.</li>
<li>Review logs from Net2 ACUs for suspicious activity, if available, focusing on unusual unlock events.</li>
<li>Deploy the Sigma rule for unexpected user agents to detect reconnaissance activity targeting these devices.</li>
<li>Block access to <code>https://it4sec.substack.com/p/hacking-prison-doors-remotely-like</code> at the web proxy, as this site may contain exploit information.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>access-control</category><category>physical-security</category><category>vulnerability</category></item></channel></rss>