Security Alert: Verbatim Keypad Secure Vulnerable to Offline Brute-Force Attack

A critical security vulnerability has been discovered in the latest version of Verbatim Keypad Secure, a widely used security solution. The vulnerability, identified as SYSS-2025-015, affects the software's offline brute-force attack capabilities.

The vulnerability was discovered by security researchers and is classified as high-severity. It allows an attacker to attempt unlimited guesses on the keypad combination without being detected, potentially compromising the security of sensitive devices or systems.

The affected version of Verbatim Keypad Secure is v1.0.0.6. Researchers recommend that users upgrade to the latest patch, which fixes this vulnerability and improves overall security.

What is the Impact of the Vulnerability?

The offline brute-force attack capability allows an attacker to attempt an unlimited number of guesses on the keypad combination without being detected. This could potentially allow an attacker to gain unauthorized access to sensitive devices or systems, compromising user data and confidentiality.

The vulnerability also poses a significant risk to organizations that rely on secure devices or systems for critical operations. A successful attack could lead to data breaches, system downtime, and reputational damage.

How to Protect Against the Vulnerability

To protect against this vulnerability, we recommend the following:

  • Upgrade to the latest version of Verbatim Keypad Secure (v1.0.0.7 or later).
  • Implement a robust security posture, including multi-factor authentication and regular software updates.
  • Monitor device activity and implement incident response plans in case of a potential breach.

Further information on the vulnerability and mitigation strategies can be found in the detailed advisory document attached to this announcement. Users are advised to take immediate action to patch their systems and protect against potential attacks.

Attachments:

OpenPGP digital signature