CVE-2018-16242

oBike relies on Hangzhou Luoping Smart Locker to lock bicycles, which allows attackers to bypass the locking mechanism by using Bluetooth Low Energy (BLE) to replay ciphertext based on a predictable nonce used in the locking protocol.
References
Link Resource
https://seclists.org/bugtraq/2018/Sep/30 Exploit Mailing List Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:o.bike:smart_locker_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:o.bike:smart_locker:-:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:o.bike:obike-stationless_bike_sharing:2.5.4:*:*:*:*:android:*:*

History

No history.

Information

Published : 2018-09-14 21:29

Updated : 2023-12-10 12:44


NVD link : CVE-2018-16242

Mitre link : CVE-2018-16242

CVE.ORG link : CVE-2018-16242


JSON object : View

Products Affected

o.bike

  • obike-stationless_bike_sharing
  • smart_locker
  • smart_locker_firmware
CWE
CWE-294

Authentication Bypass by Capture-replay