CVE-2023-50128

The remote keyless system of the Hozard alarm system (alarmsystemen) v1.0 sends an identical radio frequency signal for each request, which results in an attacker being able to conduct replay attacks to bring the alarm system to a disarmed state.
Configurations

Configuration 1 (hide)

cpe:2.3:a:hozard:alarm_system:1.0:*:*:*:*:*:*:*

History

19 Jan 2024, 15:29

Type Values Removed Values Added
CWE CWE-294
References () http://hozard.com - () http://hozard.com - Product
References () https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices - () https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices - Third Party Advisory
First Time Hozard
Hozard alarm System
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3
CPE cpe:2.3:a:hozard:alarm_system:1.0:*:*:*:*:*:*:*

12 Jan 2024, 13:47

Type Values Removed Values Added
Summary
  • (es) El sistema remoto sin llave del sistema de Hozard alarm system (alarmsystemen) v1.0 envía una señal de radiofrecuencia idéntica para cada solicitud, lo que da como resultado que un atacante pueda realizar ataques de repetición para desarmar el sistema de alarma.

11 Jan 2024, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-11 21:15

Updated : 2024-01-19 15:29


NVD link : CVE-2023-50128

Mitre link : CVE-2023-50128

CVE.ORG link : CVE-2023-50128


JSON object : View

Products Affected

hozard

  • alarm_system
CWE
CWE-294

Authentication Bypass by Capture-replay