Hozard alarm system (Alarmsysteem) v1.0 is vulnerable to Improper Authentication. Commands sent via the SMS functionality are accepted from random phone numbers, which allows an attacker to bring the alarm system to a disarmed state from any given phone number.
References
Link | Resource |
---|---|
https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices | Exploit Third Party Advisory |
Configurations
History
18 Jan 2024, 20:21
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-287 | |
References | () https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devicesĀ - Exploit, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.9 |
CPE | cpe:2.3:a:hozard:alarm_system:1.0:*:*:*:*:*:*:* | |
First Time |
Hozard alarm System
Hozard |
11 Jan 2024, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-01-11 21:15
Updated : 2024-02-28 20:54
NVD link : CVE-2023-50127
Mitre link : CVE-2023-50127
CVE.ORG link : CVE-2023-50127
JSON object : View
Products Affected
hozard
- alarm_system
CWE
CWE-287
Improper Authentication