CVE-2023-50124

Flient Smart Door Lock v1.0 is vulnerable to Use of Default Credentials. Due to default credentials on a debug interface, in combination with certain design choices, an attacker can unlock the Flient Smart Door Lock by replacing the fingerprint that is stored on the scanner.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:flient:smart_lock_advanced_firmware:1.0:*:*:*:*:*:*:*
cpe:2.3:h:flient:smart_lock_advanced:-:*:*:*:*:*:*:*

History

19 Jan 2024, 14:42

Type Values Removed Values Added
CPE cpe:2.3:h:flient:smart_lock_advanced:-:*:*:*:*:*:*:*
cpe:2.3:o:flient:smart_lock_advanced_firmware:1.0:*:*:*:*:*:*:*
First Time Flient smart Lock Advanced
Flient
Flient smart Lock Advanced Firmware
CWE CWE-798
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.8
References () https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices - () https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices - Exploit, Third Party Advisory

12 Jan 2024, 13:47

Type Values Removed Values Added
Summary
  • (es) Flient Smart Door Lock v1.0 es vulnerable al uso de credenciales predeterminadas. Debido a las credenciales predeterminadas en una interfaz de depuración, en combinación con ciertas opciones de diseño, un atacante puede desbloquear Flient Smart Door Lock reemplazando la huella digital almacenada en el escáner.

11 Jan 2024, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-11 21:15

Updated : 2024-01-19 14:42


NVD link : CVE-2023-50124

Mitre link : CVE-2023-50124

CVE.ORG link : CVE-2023-50124


JSON object : View

Products Affected

flient

  • smart_lock_advanced
  • smart_lock_advanced_firmware
CWE
CWE-798

Use of Hard-coded Credentials