FKIE_CVE-2023-7009
Vulnerability from fkie_nvd - Published: 2024-03-15 17:15 - Updated: 2025-11-04 19:16
Severity ?
Summary
Some Sciener-based locks support plaintext message processing over Bluetooth Low Energy, allowing unencrypted malicious commands to be passed to the lock. These malicious commands, less then 16 bytes in length, will be processed by the lock as if they were encrypted communications. This can be further exploited by an attacker to compromise the lock's integrity.
References
Impacted products
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Some Sciener-based locks support plaintext message processing over Bluetooth Low Energy, allowing unencrypted malicious commands to be passed to the lock. These malicious commands, less then 16 bytes in length, will be processed by the lock as if they were encrypted communications. This can be further exploited by an attacker to compromise the lock\u0027s integrity."
},
{
"lang": "es",
"value": "Algunas cerraduras basadas en Sciener admiten el procesamiento de mensajes de texto plano a trav\u00e9s de Bluetooth Low Energy, lo que permite pasar comandos maliciosos sin cifrar a la cerradura. Estos comandos maliciosos, de menos de 16 bytes de longitud, ser\u00e1n procesados por la cerradura como si fueran comunicaciones cifradas. Un atacante puede aprovechar a\u00fan m\u00e1s esto para comprometer la integridad del bloqueo."
}
],
"id": "CVE-2023-7009",
"lastModified": "2025-11-04T19:16:26.080",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 4.2,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2024-03-15T17:15:07.810",
"references": [
{
"source": "cret@cert.org",
"url": "https://alephsecurity.com/2024/03/07/kontrol-lux-lock-2/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://alephsecurity.com/2024/03/07/kontrol-lux-lock-2/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.kb.cert.org/vuls/id/949046"
}
],
"sourceIdentifier": "cret@cert.org",
"vulnStatus": "Awaiting Analysis"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…