Description
Insecure storage of the ICT MIFARE and DESFire encryption keys in the firmware
binary allows malicious actors to create credentials for any site code and card number that is using the default
ICT encryption.

Published: 2024-05-06
Score: 8.0 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Workaround

* Use custom keysets unique to customer sites to prevent cards being created by third parties using exploited publicly available default keysets * Setup two-factor authentication (2FA) on all doors where PIN readers are installed to mitigate the risk of using credentials with publicly available default keysets

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

No history.

Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: ICT

Published:

Updated: 2024-08-02T01:17:58.493Z

Reserved: 2024-03-21T20:07:00.532Z

Link: CVE-2024-29941

cve-icon Vulnrichment

Updated: 2024-08-02T01:17:58.493Z

cve-icon NVD

Status : Deferred

Published: 2024-05-06T23:15:06.527

Modified: 2026-04-15T00:35:42.020

Link: CVE-2024-29941

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses