Description
An authentication bypass in website post requests in the Tzumi Electronics Klic Lock application 1.0.9 for mobile devices allows attackers to access resources (that are not otherwise accessible without proper authentication) via capture-replay. Physically proximate attackers can use this information to unlock unauthorized Tzumi Electronics Klic Smart Padlock Model 5686 Firmware 6.2.
Published: 2019-06-11
Score: 3.7 Low
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2019-3015 An authentication bypass in website post requests in the Tzumi Electronics Klic Lock application 1.0.9 for mobile devices allows attackers to access resources (that are not otherwise accessible without proper authentication) via capture-replay. Physically proximate attackers can use this information to unlock unauthorized Tzumi Electronics Klic Smart Padlock Model 5686 Firmware 6.2.
History

No history.

Subscriptions

Tzumi Klic Lock Klic Smart Padlock Model 5686 Klic Smart Padlock Model 5686 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T22:48:09.169Z

Reserved: 2019-04-18T00:00:00.000Z

Link: CVE-2019-11334

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-06-11T18:29:00.957

Modified: 2024-11-21T04:20:54.320

Link: CVE-2019-11334

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses