Description
A vulnerability was detected in Shenzhen HCC Technology MPOS M6 PLUS 1V.31-N. Affected by this issue is some unknown functionality of the component Bluetooth Handler. Performing a manipulation results in authentication bypass by capture-replay. The attack must originate from the local network. The attack is considered to have high complexity. The exploitation is known to be difficult. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-03-23
Score: 2.3 Low
EPSS: < 1% Very Low
KEV: No
Impact: Authentication Bypass
Action: Assess Impact
AI Analysis

Impact

A flaw in the Bluetooth handler of the MPOS M6 PLUS 1V.31-N allows an attacker on the same local network to replay captured authentication data and bypass normal authentication. The vulnerability is a classic authentication bypass and replay attack, as classified by CWE-287 and CWE-294. By exploiting this weakness, an unauthorized user may gain unauthenticated access to the device’s services and potentially read or modify sensitive information, in addition to any functional privileges granted to an authenticated user.

Affected Systems

The affected hardware is the Shenzhen HCC Technology MPOS M6 PLUS, specifically firmware version 1V.31‑N. No other versions or products are listed as impacted in the current advisory.

Risk and Exploitability

The CVSS score of 2.3 indicates low intrinsic severity, and the Exploit Prediction Score is not provided. The issue is not listed in the CISA KEV catalog. The attack requires proximity to the device on the local network, with high exploitation complexity and low likelihood of success. If an attacker can physically route traffic through the Bluetooth interface, they could replay authentication packets, making the risk higher in environments where such devices are exposed to untrusted networks.

Generated by OpenCVE AI on March 23, 2026 at 11:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the vendor’s website regularly for firmware or security updates that address this issue.
  • Limit network access to the device by placing it behind a secure VLAN or firewall that only trusted users can reach.
  • If Bluetooth connectivity is unnecessary, disable the Bluetooth interface to remove the attack surface.
  • Enable logging of authentication attempts and review logs for abnormal replay patterns.
  • Consider adding physical security controls to reduce the likelihood that an attacker can position a Bluetooth sniffer or replay device near the POS machine.

Generated by OpenCVE AI on March 23, 2026 at 11:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 25 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 24 Mar 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Shenzhen Hcc Technology
Shenzhen Hcc Technology mpos M6 Plus
Vendors & Products Shenzhen Hcc Technology
Shenzhen Hcc Technology mpos M6 Plus

Mon, 23 Mar 2026 10:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in Shenzhen HCC Technology MPOS M6 PLUS 1V.31-N. Affected by this issue is some unknown functionality of the component Bluetooth Handler. Performing a manipulation results in authentication bypass by capture-replay. The attack must originate from the local network. The attack is considered to have high complexity. The exploitation is known to be difficult. The vendor was contacted early about this disclosure but did not respond in any way.
Title Shenzhen HCC Technology MPOS M6 PLUS Bluetooth authentication replay
Weaknesses CWE-287
CWE-294
References
Metrics cvssV2_0

{'score': 4.3, 'vector': 'AV:A/AC:H/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 5, 'vector': 'CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 5, 'vector': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 2.3, 'vector': 'CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Shenzhen Hcc Technology Mpos M6 Plus
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-25T14:04:39.752Z

Reserved: 2026-03-22T08:59:02.251Z

Link: CVE-2026-4583

cve-icon Vulnrichment

Updated: 2026-03-25T14:04:35.368Z

cve-icon NVD

Status : Deferred

Published: 2026-03-23T11:16:24.847

Modified: 2026-04-24T16:32:53.997

Link: CVE-2026-4583

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:49:24Z

Weaknesses