Show filters
9 Total Results
Displaying 1-9 of 9
Sort by:
Attacker Value
Unknown

CVE-2019-12393

Disclosure Date: December 02, 2019 (last updated November 27, 2024)
Anviz access control devices are vulnerable to replay attacks which could allow attackers to intercept and replay open door requests.
Attacker Value
Unknown

CVE-2019-12392

Disclosure Date: December 02, 2019 (last updated November 27, 2024)
Anviz access control devices allow remote attackers to issue commands without a password.
Attacker Value
Unknown

CVE-2019-12390

Disclosure Date: December 02, 2019 (last updated November 27, 2024)
Anviz access control devices expose private Information (pin code and name) by allowing remote attackers to query this information without credentials via port tcp/5010.
Attacker Value
Unknown

CVE-2019-12394

Disclosure Date: December 02, 2019 (last updated November 27, 2024)
Anviz access control devices allow unverified password change which allows remote attackers to change the administrator password without prior authentication.
Attacker Value
Unknown

CVE-2019-12391

Disclosure Date: December 02, 2019 (last updated November 27, 2024)
The Anviz Management System for access control has insufficient logging for device events such as door open requests.
Attacker Value
Unknown

CVE-2019-12388

Disclosure Date: December 02, 2019 (last updated November 27, 2024)
Anviz access control devices perform cleartext transmission of sensitive information (passwords/pins and names) when replying to query on port tcp/5010.
Attacker Value
Unknown

CVE-2019-12389

Disclosure Date: October 10, 2019 (last updated November 27, 2024)
Anviz access control devices expose credentials (names and passwords) by allowing remote attackers to query this information without credentials via port tcp/5010.
Attacker Value
Unknown

CVE-2019-12518

Disclosure Date: September 11, 2019 (last updated November 27, 2024)
Anviz CrossChex access control management software 4.3.8.0 and 4.3.12 is vulnerable to a buffer overflow vulnerability.
Attacker Value
Unknown

CVE-2019-11523

Disclosure Date: June 06, 2019 (last updated November 27, 2024)
Anviz Global M3 Outdoor RFID Access Control executes any command received from any source. No authentication/encryption is done. Attackers can fully interact with the device: for example, send the "open door" command, download the users list (which includes RFID codes and passcodes in cleartext), or update/create users. The same attack can be executed on a local network and over the internet (if the device is exposed on a public IP address).
0