Anviz Global M3 Outdoor RFID Access Control executes any command received from any source. No authentication/encryption is done. Attackers can fully interact with the device: for example, send the "open door" command, download the users list (which includes RFID codes and passcodes in cleartext), or update/create users. The same attack can be executed on a local network and over the internet (if the device is exposed on a public IP address).
References
Link | Resource |
---|---|
https://github.com/wizlab-it/anviz-m3-rfid-cve-2019-11523-poc | Exploit Mitigation Third Party Advisory |
https://github.com/wizlab-it/anviz-m3-rfid-cve-2019-11523-poc | Exploit Mitigation Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 04:21
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/wizlab-it/anviz-m3-rfid-cve-2019-11523-pocĀ - Exploit, Mitigation, Third Party Advisory |
Information
Published : 2019-06-06 20:29
Updated : 2024-11-21 04:21
NVD link : CVE-2019-11523
Mitre link : CVE-2019-11523
CVE.ORG link : CVE-2019-11523
JSON object : View
Products Affected
anviz
- m3
- m3_firmware