CVE-2023-50128

The remote keyless system of the Hozard alarm system (alarmsystemen) v1.0 sends an identical radio frequency signal for each request, which results in an attacker being able to conduct replay attacks to bring the alarm system to a disarmed state.
Configurations

Configuration 1 (hide)

cpe:2.3:a:hozard:alarm_system:1.0:*:*:*:*:*:*:*

History

19 Jan 2024, 15:29

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3
First Time Hozard alarm System
Hozard
References () http://hozard.com - () http://hozard.com - Product
References () https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices - () https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices - Third Party Advisory
CPE cpe:2.3:a:hozard:alarm_system:1.0:*:*:*:*:*:*:*
CWE CWE-294

11 Jan 2024, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-11 21:15

Updated : 2024-02-28 20:54


NVD link : CVE-2023-50128

Mitre link : CVE-2023-50128

CVE.ORG link : CVE-2023-50128


JSON object : View

Products Affected

hozard

  • alarm_system
CWE
CWE-294

Authentication Bypass by Capture-replay