CVE-2018-20958

The Bluetooth Low Energy (BLE) subsystem on Tapplock devices before 2018-06-12 relies on Key1 and SerialNo for unlock operations; however, these are derived from the MAC address, which is broadcasted by the device.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tapplock:tapplock_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tapplock:tapplock:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:02

Type Values Removed Values Added
References () https://tapplock.com/notice/20180612/ - Vendor Advisory () https://tapplock.com/notice/20180612/ - Vendor Advisory
References () https://www.pentestpartners.com/security-blog/totally-pwning-the-tapplock-smart-lock/ - Third Party Advisory () https://www.pentestpartners.com/security-blog/totally-pwning-the-tapplock-smart-lock/ - Third Party Advisory

Information

Published : 2019-08-07 13:15

Updated : 2024-11-21 04:02


NVD link : CVE-2018-20958

Mitre link : CVE-2018-20958

CVE.ORG link : CVE-2018-20958


JSON object : View

Products Affected

tapplock

  • tapplock_firmware
  • tapplock
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor