
Embedded 519: The Password Is All Zeros
Jan 23, 2026
Mark Omo, an engineering director specializing in embedded security, and James Rowley, a senior security engineer, dive into the world of safecracking and vulnerability discovery. They share insights from their DEF CON talk on exploiting SecureRAM locks, including their techniques like CodeSnatch for firmware extraction. The duo discusses the failures in security engineering, the ethical dilemmas faced, and emphasizes the importance of public disclosure in improving safety. Their engaging anecdotes about legal pushback and industry practices make this conversation a must-listen for anyone interested in cybersecurity.
AI Snips
Chapters
Books
Transcript
Episode notes
Codes Should Live Inside The Safe
- SecureRAM ProLogic locks stored critical codes on the keypad outside the safe, creating a fundamental threat-model failure.
- That architectural choice made even modest implementation mistakes catastrophic for security.
Debug Port Left Wide Open
- Mark discovered the debug interface was left enabled and the debug password remained all zeros.
- Sending the all-zeros password unlocked the device without any glitching or advanced tooling.
Standards Lag Modern Embedded Security
- Existing UL and EN safe standards focus on mechanical resilience and offer vague cybersecurity guidance.
- That gap lets electronic locks meet certification while still being trivially exploitable.



