binary allows malicious actors to create credentials for any site code and card number that is using the default
ICT encryption.
Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
* Use custom keysets unique to customer sites to prevent cards being created by third parties using exploited publicly available default keysets * Setup two-factor authentication (2FA) on all doors where PIN readers are installed to mitigate the risk of using credentials with publicly available default keysets
Link | Providers |
---|---|
https://ict.co/media/1xdhaugi/credential-cloning.pdf |
![]() ![]() ![]() |
No history.

Status: PUBLISHED
Assigner: ICT
Published:
Updated: 2024-08-02T01:17:58.493Z
Reserved: 2024-03-21T20:07:00.532Z
Link: CVE-2024-29941

Updated: 2024-08-02T01:17:58.493Z

Status : Awaiting Analysis
Published: 2024-05-06T23:15:06.527
Modified: 2024-11-21T09:08:39.710
Link: CVE-2024-29941

No data.

No data.