CVE-2023-50124

Flient Smart Door Lock v1.0 is vulnerable to Use of Default Credentials. Due to default credentials on a debug interface, in combination with certain design choices, an attacker can unlock the Flient Smart Door Lock by replacing the fingerprint that is stored on the scanner.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:h:flient:smart_lock_advanced:-:*:*:*:*:*:*:*
cpe:2.3:o:flient:smart_lock_advanced_firmware:1.0:*:*:*:*:*:*:*

History

19 Jan 2024, 14:42

Type Values Removed Values Added
CWE CWE-798
References () https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devicesĀ - () https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devicesĀ - Exploit, Third Party Advisory
First Time Flient smart Lock Advanced
Flient
Flient smart Lock Advanced Firmware
CPE cpe:2.3:o:flient:smart_lock_advanced_firmware:1.0:*:*:*:*:*:*:*
cpe:2.3:h:flient:smart_lock_advanced:-:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.8

11 Jan 2024, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-11 21:15

Updated : 2024-09-03 19:35


NVD link : CVE-2023-50124

Mitre link : CVE-2023-50124

CVE.ORG link : CVE-2023-50124


JSON object : View

Products Affected

flient

  • smart_lock_advanced_firmware
  • smart_lock_advanced
CWE
CWE-798

Use of Hard-coded Credentials