### [CVE-2023-7017](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7017) ![](https://img.shields.io/static/v1?label=Product&message=Kontrol%20Lux&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=6.5.x%3C%3D%206.5.07%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check&color=brighgreen) ### Description Sciener locks' firmware update mechanism do not authenticate or validate firmware updates if passed to the lock through the Bluetooth Low Energy service. A challenge request can be sent to the lock with a command to prepare for an update, rather than an unlock request, allowing an attacker to compromise the device. ### POC #### Reference - https://alephsecurity.com/2024/03/07/kontrol-lux-lock-2/ #### Github - https://github.com/NaInSec/CVE-LIST - https://github.com/fkie-cad/nvd-json-data-feeds