The OKLOK (3.1.1) mobile companion app for Fingerprint Bluetooth Padlock FB50 (2.3) does not correctly implement its timeout on the four-digit verification code that is required for resetting passwords, nor does it properly restrict excessive verification attempts. This allows an attacker to brute force the four-digit verification code in order to bypass email verification and change the password of a victim account.
References
Link | Resource |
---|---|
https://apps.apple.com/us/app/oklok/id1392287771 | Product Third Party Advisory |
https://github.com/fierceoj/ownklok | Exploit Third Party Advisory |
https://apps.apple.com/us/app/oklok/id1392287771 | Product Third Party Advisory |
https://github.com/fierceoj/ownklok | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 04:56
Type | Values Removed | Values Added |
---|---|---|
References | () https://apps.apple.com/us/app/oklok/id1392287771 - Product, Third Party Advisory | |
References | () https://github.com/fierceoj/ownklok - Exploit, Third Party Advisory |
Information
Published : 2020-05-04 14:15
Updated : 2024-11-21 04:56
NVD link : CVE-2020-10876
Mitre link : CVE-2020-10876
CVE.ORG link : CVE-2020-10876
JSON object : View
Products Affected
oklok_project
- oklok
mica
- fingerprint_bluetooth_padlock_fb50