Show filters
9 Total Results
Displaying 1-9 of 9
Sort by:
Attacker Value
Unknown
CVE-2019-12393
Disclosure Date: December 02, 2019 (last updated November 27, 2024)
Anviz access control devices are vulnerable to replay attacks which could allow attackers to intercept and replay open door requests.
0
Attacker Value
Unknown
CVE-2019-12392
Disclosure Date: December 02, 2019 (last updated November 27, 2024)
Anviz access control devices allow remote attackers to issue commands without a password.
0
Attacker Value
Unknown
CVE-2019-12390
Disclosure Date: December 02, 2019 (last updated November 27, 2024)
Anviz access control devices expose private Information (pin code and name) by allowing remote attackers to query this information without credentials via port tcp/5010.
0
Attacker Value
Unknown
CVE-2019-12394
Disclosure Date: December 02, 2019 (last updated November 27, 2024)
Anviz access control devices allow unverified password change which allows remote attackers to change the administrator password without prior authentication.
0
Attacker Value
Unknown
CVE-2019-12391
Disclosure Date: December 02, 2019 (last updated November 27, 2024)
The Anviz Management System for access control has insufficient logging for device events such as door open requests.
0
Attacker Value
Unknown
CVE-2019-12388
Disclosure Date: December 02, 2019 (last updated November 27, 2024)
Anviz access control devices perform cleartext transmission of sensitive information (passwords/pins and names) when replying to query on port tcp/5010.
0
Attacker Value
Unknown
CVE-2019-12389
Disclosure Date: October 10, 2019 (last updated November 27, 2024)
Anviz access control devices expose credentials (names and passwords) by allowing remote attackers to query this information without credentials via port tcp/5010.
0
Attacker Value
Unknown
CVE-2019-12518
Disclosure Date: September 11, 2019 (last updated November 27, 2024)
Anviz CrossChex access control management software 4.3.8.0 and 4.3.12 is vulnerable to a buffer overflow vulnerability.
0
Attacker Value
Unknown
CVE-2019-11523
Disclosure Date: June 06, 2019 (last updated November 27, 2024)
Anviz Global M3 Outdoor RFID Access Control executes any command received from any source. No authentication/encryption is done. Attackers can fully interact with the device: for example, send the "open door" command, download the users list (which includes RFID codes and passcodes in cleartext), or update/create users. The same attack can be executed on a local network and over the internet (if the device is exposed on a public IP address).
0