• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
IT Infrastructure, Network Security, News, Physical Security

Critical Vulnerabilities Found in Popular Access Control Panels

The cybersecurity vulnerabilities, resulting in full system control, were found in firmware running on Mercury LP and EP4502 controllers.

June 23, 2022 TD Staff Leave a Comment

Tenable Splunk
stock.adobe.com/pixel_dreams

Silicon Valley, Calif.-based cybersecurity firm Trellix recently announced it discovered four zero-day vulnerabilities in HID Global Mercury access control panels, as well as four previously patched vulnerabilities that were not publicly disclosed.

The firm says the impact of these vulnerabilities is full system control, including the ability for an attacker to remotely manipulate door locks.

Trellix investigated the access control panels as part of its ongoing research to discover critical vulnerabilities, saying, “We chose this specific access control panel to research because of its ubiquitous use, the volume and criticality of industries they are used in, the security certifications the product has received and overall position in the market.”

The firm was able to achieve root access to the device’s operating system and pull its firmware for emulation and vulnerability discovery via physical access, network access and exploitation.

The vulnerabilities uncovered by Trellix allowed researchers to demonstrate the ability to remotely unlock and lock doors, subvert alarms and undermine logging and notification systems.

HID Global confirmed with Trellix that all OEM partners using Mercury boards are vulnerable to the issues on specific hardware controller platforms.

The firm says this research is actionable for vendors and third parties that collaborate with integrators to install physical access systems and that customers using HID Global Mercury boards should contact their Mercury OEM partner for access to security patches prior to weaponization by malicious threat actors, which could lead to both digital or physical breaches of sensitive information and protected locations.

“HID Global is committed to open and transparent communication with our partners to ensure the continued long-term success of our business together,” HID Global tells SSI. “We were recently informed of cybersecurity vulnerabilities within firmware running on Mercury LP and EP4502 Intelligent Controllers. We then acted quickly to confirm and address all issues reported, validated fixes externally, and posted new firmware for our OEM partners to consume. These partners then communicate with their channel to deploy the firmware fix based on their individual timelines.”

HID acquired Mercury from ACRE in 2017. You can view the full research report from Trellix here.

This article originally appeared on our sister site Security Sales & Integration. 

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: Access Control, HID Global

Related Content:

  • Cloud, SASE, Aryaka How the Cloud is Redefining Media Production and…
  • Singlewire Software mass notification interview Singlewire Software on Mass Notification Solutions
  • URI catchbox 1 Catchbox Plus: The Mic Solution That Finally Gave…
  • Engaging virtual meeting with diverse participants discussing creative ideas in a bright office space during daylight hours Diversified Survey: Workplace AV Tech is Falling Short,…

Free downloadable guide you may like:

  • Practical Design Guide for Office SpacesPractical Design Guide for Office Spaces

    Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-face time with co-workers. When designing the office spaces — and meeting spaces in particular — enabling that connection between co-workers is crucial. But introducing the right collaboration technology in meeting spaces can […]

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.