CVE-2023-7009 (GCVE-0-2023-7009)
Vulnerability from cvelistv5 – Published: 2024-03-15 17:07 – Updated: 2025-11-04 18:22
VLAI?
Title
CVE-2023-7009
Summary
Some Sciener-based locks support plaintext message processing over Bluetooth Low Energy, allowing unencrypted malicious commands to be passed to the lock. These malicious commands, less then 16 bytes in length, will be processed by the lock as if they were encrypted communications. This can be further exploited by an attacker to compromise the lock's integrity.
Severity ?
8.2 (High)
CWE
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Sciener | Kontrol Lux |
Affected:
6.5.x , ≤ 6.5.07
(custom)
|
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:sciener:kontrol_lux_firmware:6.5:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "kontrol_lux_firmware",
"vendor": "sciener",
"versions": [
{
"lessThanOrEqual": "6.5.07",
"status": "affected",
"version": "6.5",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2023-7009",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-26T15:09:45.609770Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-08-26T15:11:10.151Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2025-11-04T18:22:11.492Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://alephsecurity.com/2024/03/07/kontrol-lux-lock-2/"
},
{
"url": "https://www.kb.cert.org/vuls/id/949046"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Kontrol Lux",
"vendor": "Sciener",
"versions": [
{
"lessThanOrEqual": "6.5.07",
"status": "affected",
"version": "6.5.x",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Some Sciener-based locks support plaintext message processing over Bluetooth Low Energy, allowing unencrypted malicious commands to be passed to the lock. These malicious commands, less then 16 bytes in length, will be processed by the lock as if they were encrypted communications. This can be further exploited by an attacker to compromise the lock\u0027s integrity."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-311 Missing Encryption of Sensitive Data",
"lang": "en"
}
]
},
{
"descriptions": [
{
"description": "CWE-319 Cleartext Transmission of Sensitive Information",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-03-15T17:07:48.318Z",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"url": "https://alephsecurity.com/2024/03/07/kontrol-lux-lock-2/"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "CVE-2023-7009",
"x_generator": {
"engine": "VINCE 2.1.11",
"env": "prod",
"origin": "https://cveawg.mitre.org/api/cve/CVE-2023-7009"
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2023-7009",
"datePublished": "2024-03-15T17:07:48.318Z",
"dateReserved": "2023-12-20T15:34:13.342Z",
"dateUpdated": "2025-11-04T18:22:11.492Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"descriptions": "[{\"lang\": \"en\", \"value\": \"Some Sciener-based locks support plaintext message processing over Bluetooth Low Energy, allowing unencrypted malicious commands to be passed to the lock. These malicious commands, less then 16 bytes in length, will be processed by the lock as if they were encrypted communications. This can be further exploited by an attacker to compromise the lock\u0027s integrity.\"}, {\"lang\": \"es\", \"value\": \"Algunas cerraduras basadas en Sciener admiten el procesamiento de mensajes de texto plano a trav\\u00e9s de Bluetooth Low Energy, lo que permite pasar comandos maliciosos sin cifrar a la cerradura. Estos comandos maliciosos, de menos de 16 bytes de longitud, ser\\u00e1n procesados por la cerradura como si fueran comunicaciones cifradas. Un atacante puede aprovechar a\\u00fan m\\u00e1s esto para comprometer la integridad del bloqueo.\"}]",
"id": "CVE-2023-7009",
"lastModified": "2024-11-21T08:45:01.307",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N\", \"baseScore\": 8.2, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 4.2}]}",
"published": "2024-03-15T17:15:07.810",
"references": "[{\"url\": \"https://alephsecurity.com/2024/03/07/kontrol-lux-lock-2/\", \"source\": \"cret@cert.org\"}, {\"url\": \"https://alephsecurity.com/2024/03/07/kontrol-lux-lock-2/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "cret@cert.org",
"vulnStatus": "Awaiting Analysis"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2023-7009\",\"sourceIdentifier\":\"cret@cert.org\",\"published\":\"2024-03-15T17:15:07.810\",\"lastModified\":\"2025-11-04T19:16:26.080\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Some Sciener-based locks support plaintext message processing over Bluetooth Low Energy, allowing unencrypted malicious commands to be passed to the lock. These malicious commands, less then 16 bytes in length, will be processed by the lock as if they were encrypted communications. This can be further exploited by an attacker to compromise the lock\u0027s integrity.\"},{\"lang\":\"es\",\"value\":\"Algunas cerraduras basadas en Sciener admiten el procesamiento de mensajes de texto plano a trav\u00e9s de Bluetooth Low Energy, lo que permite pasar comandos maliciosos sin cifrar a la cerradura. Estos comandos maliciosos, de menos de 16 bytes de longitud, ser\u00e1n procesados por la cerradura como si fueran comunicaciones cifradas. Un atacante puede aprovechar a\u00fan m\u00e1s esto para comprometer la integridad del bloqueo.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N\",\"baseScore\":8.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":4.2}]},\"references\":[{\"url\":\"https://alephsecurity.com/2024/03/07/kontrol-lux-lock-2/\",\"source\":\"cret@cert.org\"},{\"url\":\"https://alephsecurity.com/2024/03/07/kontrol-lux-lock-2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.kb.cert.org/vuls/id/949046\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://alephsecurity.com/2024/03/07/kontrol-lux-lock-2/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://www.kb.cert.org/vuls/id/949046\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-11-04T18:22:11.492Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 8.2, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-7009\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-08-26T15:09:45.609770Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:sciener:kontrol_lux_firmware:6.5:*:*:*:*:*:*:*\"], \"vendor\": \"sciener\", \"product\": \"kontrol_lux_firmware\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.5\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"6.5.07\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-07-05T15:20:41.943Z\"}}], \"cna\": {\"title\": \"CVE-2023-7009\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"affected\": [{\"vendor\": \"Sciener\", \"product\": \"Kontrol Lux\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.5.x\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"6.5.07\"}]}], \"references\": [{\"url\": \"https://alephsecurity.com/2024/03/07/kontrol-lux-lock-2/\"}], \"x_generator\": {\"env\": \"prod\", \"engine\": \"VINCE 2.1.11\", \"origin\": \"https://cveawg.mitre.org/api/cve/CVE-2023-7009\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Some Sciener-based locks support plaintext message processing over Bluetooth Low Energy, allowing unencrypted malicious commands to be passed to the lock. These malicious commands, less then 16 bytes in length, will be processed by the lock as if they were encrypted communications. This can be further exploited by an attacker to compromise the lock\u0027s integrity.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"CWE-311 Missing Encryption of Sensitive Data\"}]}, {\"descriptions\": [{\"lang\": \"en\", \"description\": \"CWE-319 Cleartext Transmission of Sensitive Information\"}]}], \"providerMetadata\": {\"orgId\": \"37e5125f-f79b-445b-8fad-9564f167944b\", \"shortName\": \"certcc\", \"dateUpdated\": \"2024-03-15T17:07:48.318Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2023-7009\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-11-04T18:22:11.492Z\", \"dateReserved\": \"2023-12-20T15:34:13.342Z\", \"assignerOrgId\": \"37e5125f-f79b-445b-8fad-9564f167944b\", \"datePublished\": \"2024-03-15T17:07:48.318Z\", \"assignerShortName\": \"certcc\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…