CVE-2019-9659

The Chuango 433 MHz burglar-alarm product line uses static codes in the RF remote control, allowing an attacker to arm, disarm, or trigger the alarm remotely via replay attacks, as demonstrated by Chuango branded products, and non-Chuango branded products such as the Eminent EM8617 OV2 Wifi Alarm System.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:chuango:wifi_alarm_system_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:chuango:wifi_alarm_system:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:chuango:wifi\/cellular_smart_home_system_h4_plus_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:chuango:wifi\/cellular_smart_home_system_h4_plus:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:chuango:awv_plus_wifi_alarm_system_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:chuango:awv_plus_wifi_alarm_system:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:chuango:g5w_3g_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:chuango:g5w_3g:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:chuango:g5_plus_gsm\/sms\/rfid_touch_alarm_system_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:chuango:g5_plus_gsm\/sms\/rfid_touch_alarm_system:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:chuango:g3_gsm\/sms_alarm_system_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:chuango:g3_gsm\/sms_alarm_system:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:chuango:g5w_3g_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:chuango:g5w_3g:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:chuango:b11_dual-network_alarm_system_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:chuango:b11_dual-network_alarm_system:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:chuango:a8_pstn_alarm_system_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:chuango:a8_pstn_alarm_system:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:chuango:a11_pstn\/lcd\/rfid_touch_alarm_system_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:chuango:a11_pstn\/lcd\/rfid_touch_alarm_system:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:chuango:cg-105s_on-site_alarm_system_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:chuango:cg-105s_on-site_alarm_system:-:*:*:*:*:*:*:*

Configuration 12 (hide)

AND
cpe:2.3:o:eminent:em8617_ov2_wifi_alarm_system_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:eminent:em8617_ov2_wifi_alarm_system:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:52

Type Values Removed Values Added
References () https://github.com/RiieCco/write-ups/tree/master/CVE-2019-9659 - Third Party Advisory () https://github.com/RiieCco/write-ups/tree/master/CVE-2019-9659 - Third Party Advisory

Information

Published : 2019-03-11 15:29

Updated : 2024-11-21 04:52


NVD link : CVE-2019-9659

Mitre link : CVE-2019-9659

CVE.ORG link : CVE-2019-9659


JSON object : View

Products Affected

chuango

  • cg-105s_on-site_alarm_system
  • wifi\/cellular_smart_home_system_h4_plus_firmware
  • g5w_3g_firmware
  • a11_pstn\/lcd\/rfid_touch_alarm_system
  • cg-105s_on-site_alarm_system_firmware
  • wifi_alarm_system_firmware
  • wifi_alarm_system
  • g5_plus_gsm\/sms\/rfid_touch_alarm_system
  • a8_pstn_alarm_system
  • g5w_3g
  • g3_gsm\/sms_alarm_system_firmware
  • awv_plus_wifi_alarm_system
  • b11_dual-network_alarm_system
  • wifi\/cellular_smart_home_system_h4_plus
  • a11_pstn\/lcd\/rfid_touch_alarm_system_firmware
  • g5_plus_gsm\/sms\/rfid_touch_alarm_system_firmware
  • awv_plus_wifi_alarm_system_firmware
  • b11_dual-network_alarm_system_firmware
  • a8_pstn_alarm_system_firmware
  • g3_gsm\/sms_alarm_system

eminent

  • em8617_ov2_wifi_alarm_system
  • em8617_ov2_wifi_alarm_system_firmware
CWE
CWE-294

Authentication Bypass by Capture-replay