cve/2023/CVE-2023-7017.md

19 lines
933 B
Markdown
Raw Normal View History

2024-05-28 08:49:17 +00:00
### [CVE-2023-7017](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7017)
![](https://img.shields.io/static/v1?label=Product&message=Kontrol%20Lux&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=6.5.x%3C%3D%206.5.07%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check&color=brighgreen)
### Description
Sciener locks' firmware update mechanism do not authenticate or validate firmware updates if passed to the lock through the Bluetooth Low Energy service. A challenge request can be sent to the lock with a command to prepare for an update, rather than an unlock request, allowing an attacker to compromise the device.
### POC
#### Reference
- https://alephsecurity.com/2024/03/07/kontrol-lux-lock-2/
#### Github
- https://github.com/NaInSec/CVE-LIST
- https://github.com/fkie-cad/nvd-json-data-feeds