The remote keyless system of the Hozard alarm system (alarmsystemen) v1.0 sends an identical radio frequency signal for each request, which results in an attacker being able to conduct replay attacks to bring the alarm system to a disarmed state.
References
Link | Resource |
---|---|
http://hozard.com | Product |
https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices | Third Party Advisory |
Configurations
History
19 Jan 2024, 15:29
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
First Time |
Hozard alarm System
Hozard |
|
References | () http://hozard.com - Product | |
References | () https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices - Third Party Advisory | |
CPE | cpe:2.3:a:hozard:alarm_system:1.0:*:*:*:*:*:*:* | |
CWE | CWE-294 |
11 Jan 2024, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-01-11 21:15
Updated : 2024-02-28 20:54
NVD link : CVE-2023-50128
Mitre link : CVE-2023-50128
CVE.ORG link : CVE-2023-50128
JSON object : View
Products Affected
hozard
- alarm_system
CWE
CWE-294
Authentication Bypass by Capture-replay