CVE-2020-10876

The OKLOK (3.1.1) mobile companion app for Fingerprint Bluetooth Padlock FB50 (2.3) does not correctly implement its timeout on the four-digit verification code that is required for resetting passwords, nor does it properly restrict excessive verification attempts. This allows an attacker to brute force the four-digit verification code in order to bypass email verification and change the password of a victim account.
References
Link Resource
https://apps.apple.com/us/app/oklok/id1392287771 Product Third Party Advisory
https://github.com/fierceoj/ownklok Exploit Third Party Advisory
https://apps.apple.com/us/app/oklok/id1392287771 Product Third Party Advisory
https://github.com/fierceoj/ownklok Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:oklok_project:oklok:3.1.1:*:*:*:*:iphone_os:*:*
cpe:2.3:h:mica:fingerprint_bluetooth_padlock_fb50:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:56

Type Values Removed Values Added
References () https://apps.apple.com/us/app/oklok/id1392287771 - Product, Third Party Advisory () https://apps.apple.com/us/app/oklok/id1392287771 - Product, Third Party Advisory
References () https://github.com/fierceoj/ownklok - Exploit, Third Party Advisory () https://github.com/fierceoj/ownklok - Exploit, Third Party Advisory

Information

Published : 2020-05-04 14:15

Updated : 2024-11-21 04:56


NVD link : CVE-2020-10876

Mitre link : CVE-2020-10876

CVE.ORG link : CVE-2020-10876


JSON object : View

Products Affected

oklok_project

  • oklok

mica

  • fingerprint_bluetooth_padlock_fb50
CWE
CWE-307

Improper Restriction of Excessive Authentication Attempts

CWE-613

Insufficient Session Expiration