binary allows malicious actors to create credentials for any site code and card number that is using the default
ICT encryption.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
* Use custom keysets unique to customer sites to prevent cards being created by third parties using exploited publicly available default keysets * Setup two-factor authentication (2FA) on all doors where PIN readers are installed to mitigate the risk of using credentials with publicly available default keysets
| Link | Providers |
|---|---|
| https://ict.co/media/1xdhaugi/credential-cloning.pdf |
|
No history.
Status: PUBLISHED
Assigner: ICT
Published:
Updated: 2024-08-02T01:17:58.493Z
Reserved: 2024-03-21T20:07:00.532Z
Link: CVE-2024-29941
Updated: 2024-08-02T01:17:58.493Z
Status : Awaiting Analysis
Published: 2024-05-06T23:15:06.527
Modified: 2024-11-21T09:08:39.710
Link: CVE-2024-29941
No data.
OpenCVE Enrichment
No data.