Weak encryption mechanisms in RFID Tags in Yale Conexis L1 v1.1.0 allows attackers to create a cloned tag via physical proximity to the original.
References
Link | Resource |
---|---|
https://arxiv.org/abs/2312.00021 | |
https://www.researchgate.net/publication/375759408_Technical_Report_-_CVE-2022-46480_CVE-2023-26941_CVE-2023-26942_and_CVE-2023-26943#fullTextFileContent | Exploit Technical Description Third Party Advisory |
https://arxiv.org/abs/2312.00021 | |
https://www.researchgate.net/publication/375759408_Technical_Report_-_CVE-2022-46480_CVE-2023-26941_CVE-2023-26942_and_CVE-2023-26943#fullTextFileContent | Exploit Technical Description Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 07:52
Type | Values Removed | Values Added |
---|---|---|
References | () https://arxiv.org/abs/2312.00021 - | |
References | () https://www.researchgate.net/publication/375759408_Technical_Report_-_CVE-2022-46480_CVE-2023-26941_CVE-2023-26942_and_CVE-2023-26943#fullTextFileContent - Exploit, Technical Description, Third Party Advisory |
16 Jan 2024, 02:15
Type | Values Removed | Values Added |
---|---|---|
First Time |
Assaabloy yale Conexis L1 Firmware
Assaabloy yale Conexis L1 Assaabloy |
|
References |
|
|
References | () https://www.researchgate.net/publication/375759408_Technical_Report_-_CVE-2022-46480_CVE-2023-26941_CVE-2023-26942_and_CVE-2023-26943#fullTextFileContent - Exploit, Technical Description, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
CPE | cpe:2.3:o:assaabloy:yale_conexis_l1_firmware:1.1.0:*:*:*:*:*:*:* cpe:2.3:h:assaabloy:yale_conexis_l1:-:*:*:*:*:*:*:* |
|
CWE | CWE-326 |
05 Dec 2023, 00:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-12-05 00:15
Updated : 2024-11-21 07:52
NVD link : CVE-2023-26941
Mitre link : CVE-2023-26941
CVE.ORG link : CVE-2023-26941
JSON object : View
Products Affected
assaabloy
- yale_conexis_l1
- yale_conexis_l1_firmware
CWE
CWE-326
Inadequate Encryption Strength