Flient Smart Door Lock v1.0 is vulnerable to Use of Default Credentials. Due to default credentials on a debug interface, in combination with certain design choices, an attacker can unlock the Flient Smart Door Lock by replacing the fingerprint that is stored on the scanner.
References
| Link | Resource |
|---|---|
| https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
19 Jan 2024, 14:42
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:h:flient:smart_lock_advanced:-:*:*:*:*:*:*:* cpe:2.3:o:flient:smart_lock_advanced_firmware:1.0:*:*:*:*:*:*:* |
|
| First Time |
Flient smart Lock Advanced
Flient Flient smart Lock Advanced Firmware |
|
| CWE | CWE-798 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.8 |
| References | () https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices - Exploit, Third Party Advisory |
12 Jan 2024, 13:47
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
11 Jan 2024, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-01-11 21:15
Updated : 2024-01-19 14:42
NVD link : CVE-2023-50124
Mitre link : CVE-2023-50124
CVE.ORG link : CVE-2023-50124
JSON object : View
Products Affected
flient
- smart_lock_advanced
- smart_lock_advanced_firmware
CWE
CWE-798
Use of Hard-coded Credentials
