binary allows malicious actors to create credentials for any site code and card number that is using the default
ICT encryption.
No analysis available yet.
Vendor Workaround
* Use custom keysets unique to customer sites to prevent cards being created by third parties using exploited publicly available default keysets * Setup two-factor authentication (2FA) on all doors where PIN readers are installed to mitigate the risk of using credentials with publicly available default keysets
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://ict.co/media/1xdhaugi/credential-cloning.pdf |
|
No history.
Subscriptions
No data.
Status: PUBLISHED
Assigner: ICT
Published:
Updated: 2024-08-02T01:17:58.493Z
Reserved: 2024-03-21T20:07:00.532Z
Link: CVE-2024-29941
Updated: 2024-08-02T01:17:58.493Z
Status : Deferred
Published: 2024-05-06T23:15:06.527
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-29941
No data.
OpenCVE Enrichment
No data.