Some Sciener-based locks support plaintext message processing over Bluetooth Low Energy, allowing unencrypted malicious commands to be passed to the lock. These malicious commands, less then 16 bytes in length, will be processed by the lock as if they were encrypted communications. This can be further exploited by an attacker to compromise the lock's integrity.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://alephsecurity.com/2024/03/07/kontrol-lux-lock-2/ |
![]() ![]() ![]() |
History
Mon, 26 Aug 2024 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2024-08-26T15:11:10.151Z
Reserved: 2023-12-20T15:34:13.342Z
Link: CVE-2023-7009

Updated: 2024-08-02T08:50:07.596Z

Status : Awaiting Analysis
Published: 2024-03-15T17:15:07.810
Modified: 2024-11-21T08:45:01.307
Link: CVE-2023-7009

No data.