CVE-2022-30111

Due to the use of an insecure algorithm for rolling codes in MCK Smartlock 1.0, allows attackers to unlock the mechanism via replay attacks.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mck_smartlock_project:mck_smartlock:1.0:*:*:*:*:*:*:*

History

26 May 2022, 16:24

Type Values Removed Values Added
References (MISC) https://twitter.com/Kevin2600/status/1495007534419038213 - (MISC) https://twitter.com/Kevin2600/status/1495007534419038213 - Exploit, Third Party Advisory
References (MISC) https://www.youtube.com/watch?v=EruaGuE-cWI - (MISC) https://www.youtube.com/watch?v=EruaGuE-cWI - Exploit, Third Party Advisory
References (MISC) https://tiger-team-1337.blogspot.com/2022/05/rf-remote-mck-lock-predictable-rolling.html - (MISC) https://tiger-team-1337.blogspot.com/2022/05/rf-remote-mck-lock-predictable-rolling.html - Exploit, Third Party Advisory
First Time Mck Smartlock Project
Mck Smartlock Project mck Smartlock
CVSS v2 : unknown
v3 : unknown
v2 : 4.6
v3 : 6.8
CWE CWE-327
CPE cpe:2.3:a:mck_smartlock_project:mck_smartlock:1.0:*:*:*:*:*:*:*

18 May 2022, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-05-18 18:15

Updated : 2023-12-10 14:22


NVD link : CVE-2022-30111

Mitre link : CVE-2022-30111

CVE.ORG link : CVE-2022-30111


JSON object : View

Products Affected

mck_smartlock_project

  • mck_smartlock
CWE
CWE-327

Use of a Broken or Risky Cryptographic Algorithm