The APK file in Cloud Smart Lock v2.0.1 has a leaked a URL that can call an API for binding physical devices. This vulnerability allows attackers to arbitrarily construct a request to use the app to bind to unknown devices by finding a valid serial number via a bruteforce attack.
History

Thu, 24 Oct 2024 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Cloud Smart Lock
Cloud Smart Lock cloud Smart Lock Firmware
Weaknesses CWE-863
CPEs cpe:2.3:o:cloud_smart_lock:cloud_smart_lock_firmware:2.0.1:*:*:*:*:*:*:*
Vendors & Products Cloud Smart Lock
Cloud Smart Lock cloud Smart Lock Firmware
Metrics cvssV3_1

{'score': 9.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 24 Oct 2024 17:00:00 +0000

Type Values Removed Values Added
Description The APK file in Cloud Smart Lock v2.0.1 has a leaked a URL that can call an API for binding physical devices. This vulnerability allows attackers to arbitrarily construct a request to use the app to bind to unknown devices by finding a valid serial number via a bruteforce attack.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2024-10-24T00:00:00

Updated: 2024-10-24T20:55:38.207Z

Reserved: 2024-10-08T00:00:00

Link: CVE-2024-48548

cve-icon Vulnrichment

Updated: 2024-10-24T20:55:23.611Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-10-24T17:15:17.663

Modified: 2024-10-25T12:56:07.750

Link: CVE-2024-48548

cve-icon Redhat

No data.