It may be more than a long shot because it not just about catching someone in the pairing process, it’s about intercepting the pairing process to cause it to fail and then making it fall back to S0 pairing and then capturing the radio waves and decrypting it.
For that to work that someone needs to be within about 50-100ft of your lock to be able to successfully achieve this exploit.
I wrote up this note yesterday on this article:
From the article:
During the period when a user paired their controller (such as a smartphone or smart home hub) with the device
So it’s ONLY vulnerable during the pairing process. i.e. they would need access to your lock physically and assuming it’s isn’t already paired to your existing hub. If it’s already paired, sorry guys you’ll have to find a way to hack into exclude it first, but then it would be easier to just break down the door
But then again if they have access to the “pairing” of the lock, why go through the process of hacking it? Can’t you just “unlock” it after pairing it using your app?
So the moral of this story:
Don’t leave your lock lying around unpaired - but then again you need the “Master Code” to start the pairing process…