Show filters
4 Total Results
Displaying 1-4 of 4
Sort by:
Attacker Value
Unknown
CVE-2023-7017
Disclosure Date: March 15, 2024 (last updated April 01, 2024)
Sciener locks' firmware update mechanism do not authenticate or validate firmware updates if passed to the lock through the Bluetooth Low Energy service. A challenge request can be sent to the lock with a command to prepare for an update, rather than an unlock request, allowing an attacker to compromise the device.
0
Attacker Value
Unknown
CVE-2023-7009
Disclosure Date: March 15, 2024 (last updated April 01, 2024)
Some Sciener-based locks support plaintext message processing over Bluetooth Low Energy, allowing unencrypted malicious commands to be passed to the lock. These malicious commands, less then 16 bytes in length, will be processed by the lock as if they were encrypted communications. This can be further exploited by an attacker to compromise the lock's integrity.
0
Attacker Value
Unknown
CVE-2023-7006
Disclosure Date: March 15, 2024 (last updated April 01, 2024)
The unlockKey character in a lock using Sciener firmware can be brute forced through repeated challenge requests, compromising the locks integrity.
0
Attacker Value
Unknown
CVE-2023-7003
Disclosure Date: March 15, 2024 (last updated February 26, 2025)
The AES key utilized in the pairing process between a lock using Sciener firmware and a wireless keypad is not unique, and can be reused to compromise other locks using the Sciener firmware.
0