CVE-2024-22388

Certain configuration available in the communication channel for encoders could expose sensitive data when reader configuration cards are programmed. This data could include credential and device administration keys.
References
Link Resource
https://support.hidglobal.com/ Product
https://www.cisa.gov/news-events/ics-advisories/icsa-24-037-01 Third Party Advisory US Government Resource
https://support.hidglobal.com/ Product
https://www.cisa.gov/news-events/ics-advisories/icsa-24-037-01 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:hidglobal:iclass_se_cp1000_encoder_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:hidglobal:iclass_se_cp1000_encoder:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:hidglobal:iclass_se_readers_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:hidglobal:iclass_se_readers:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:hidglobal:iclass_se_reader_modules_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:hidglobal:iclass_se_reader_modules:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:hidglobal:iclass_se_processors_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:hidglobal:iclass_se_processors:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:hidglobal:omnikey_5427ck_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:hidglobal:omnikey_5427ck:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:hidglobal:omnikey_5127ck_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:hidglobal:omnikey_5127ck:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:hidglobal:omnikey_5023_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:hidglobal:omnikey_5023:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:hidglobal:omnikey_5027_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:hidglobal:omnikey_5027:-:*:*:*:*:*:*:*

History

21 Nov 2024, 08:56

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 7.8
v2 : unknown
v3 : 5.9
References () https://support.hidglobal.com/ - Product () https://support.hidglobal.com/ - Product
References () https://www.cisa.gov/news-events/ics-advisories/icsa-24-037-01 - Third Party Advisory, US Government Resource () https://www.cisa.gov/news-events/ics-advisories/icsa-24-037-01 - Third Party Advisory, US Government Resource

17 Oct 2024, 19:15

Type Values Removed Values Added
CWE CWE-285 CWE-1188
Summary (en) Certain configuration available in the communication channel for encoders could expose sensitive data when reader configuration cards are programmed. This data could include credential and device administration keys. (en) Certain configuration available in the communication channel for encoders could expose sensitive data when reader configuration cards are programmed. This data could include credential and device administration keys.

14 Feb 2024, 20:59

Type Values Removed Values Added
References () https://support.hidglobal.com/ - () https://support.hidglobal.com/ - Product
References () https://www.cisa.gov/news-events/ics-advisories/icsa-24-037-01 - () https://www.cisa.gov/news-events/ics-advisories/icsa-24-037-01 - Third Party Advisory, US Government Resource
First Time Hidglobal iclass Se Readers
Hidglobal iclass Se Processors Firmware
Hidglobal iclass Se Reader Modules
Hidglobal omnikey 5127ck
Hidglobal
Hidglobal omnikey 5023 Firmware
Hidglobal iclass Se Cp1000 Encoder
Hidglobal omnikey 5427ck
Hidglobal omnikey 5127ck Firmware
Hidglobal iclass Se Readers Firmware
Hidglobal iclass Se Cp1000 Encoder Firmware
Hidglobal omnikey 5027 Firmware
Hidglobal iclass Se Processors
Hidglobal omnikey 5427ck Firmware
Hidglobal omnikey 5027
Hidglobal omnikey 5023
Hidglobal iclass Se Reader Modules Firmware
CPE cpe:2.3:o:hidglobal:iclass_se_reader_modules_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:hidglobal:omnikey_5427ck:-:*:*:*:*:*:*:*
cpe:2.3:h:hidglobal:iclass_se_processors:-:*:*:*:*:*:*:*
cpe:2.3:h:hidglobal:iclass_se_cp1000_encoder:-:*:*:*:*:*:*:*
cpe:2.3:h:hidglobal:omnikey_5027:-:*:*:*:*:*:*:*
cpe:2.3:h:hidglobal:iclass_se_readers:-:*:*:*:*:*:*:*
cpe:2.3:o:hidglobal:iclass_se_processors_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:hidglobal:omnikey_5127ck:-:*:*:*:*:*:*:*
cpe:2.3:o:hidglobal:omnikey_5427ck_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:hidglobal:omnikey_5127ck_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:hidglobal:iclass_se_cp1000_encoder_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:hidglobal:omnikey_5023:-:*:*:*:*:*:*:*
cpe:2.3:o:hidglobal:iclass_se_readers_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:hidglobal:iclass_se_reader_modules:-:*:*:*:*:*:*:*
cpe:2.3:o:hidglobal:omnikey_5027_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:hidglobal:omnikey_5023_firmware:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE NVD-CWE-Other

06 Feb 2024, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-06 23:15

Updated : 2024-11-21 08:56


NVD link : CVE-2024-22388

Mitre link : CVE-2024-22388

CVE.ORG link : CVE-2024-22388


JSON object : View

Products Affected

hidglobal

  • omnikey_5427ck
  • omnikey_5127ck
  • omnikey_5027
  • iclass_se_cp1000_encoder_firmware
  • iclass_se_reader_modules
  • omnikey_5027_firmware
  • iclass_se_cp1000_encoder
  • omnikey_5023_firmware
  • iclass_se_readers_firmware
  • iclass_se_processors_firmware
  • iclass_se_readers
  • iclass_se_reader_modules_firmware
  • iclass_se_processors
  • omnikey_5127ck_firmware
  • omnikey_5023
  • omnikey_5427ck_firmware
CWE
CWE-1188

Insecure Default Initialization of Resource

NVD-CWE-Other