The APK file in Cloud Smart Lock v2.0.1 has a leaked a URL that can call an API for binding physical devices. This vulnerability allows attackers to arbitrarily construct a request to use the app to bind to unknown devices by finding a valid serial number via a bruteforce attack.
Metrics
Affected Vendors & Products
References
History
Thu, 24 Oct 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Cloud Smart Lock
Cloud Smart Lock cloud Smart Lock Firmware |
|
Weaknesses | CWE-863 | |
CPEs | cpe:2.3:o:cloud_smart_lock:cloud_smart_lock_firmware:2.0.1:*:*:*:*:*:*:* | |
Vendors & Products |
Cloud Smart Lock
Cloud Smart Lock cloud Smart Lock Firmware |
|
Metrics |
cvssV3_1
|
Thu, 24 Oct 2024 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The APK file in Cloud Smart Lock v2.0.1 has a leaked a URL that can call an API for binding physical devices. This vulnerability allows attackers to arbitrarily construct a request to use the app to bind to unknown devices by finding a valid serial number via a bruteforce attack. | |
References |
|
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2024-10-24T00:00:00
Updated: 2024-10-24T20:55:38.207Z
Reserved: 2024-10-08T00:00:00
Link: CVE-2024-48548
Vulnrichment
Updated: 2024-10-24T20:55:23.611Z
NVD
Status : Awaiting Analysis
Published: 2024-10-24T17:15:17.663
Modified: 2024-10-25T12:56:07.750
Link: CVE-2024-48548
Redhat
No data.