cvelist/2023/7xxx/CVE-2023-7005.json

72 lines
2.3 KiB
JSON
Raw Normal View History

2023-12-20 15:01:12 +00:00
{
2024-12-19 18:00:59 +00:00
"data_version": "4.0",
2023-12-20 15:01:12 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-7005",
2024-12-19 18:00:59 +00:00
"ASSIGNER": "cert@cert.org",
"STATE": "PUBLIC"
2023-12-20 15:01:12 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-12-19 18:00:59 +00:00
"value": "A specially crafted message can be sent to the TTLock App that downgrades the encryption protocol used for communication, and can be utilized to compromise the lock, such as through revealing the unlockKey field."
2023-12-20 15:01:12 +00:00
}
]
2024-12-19 18:00:59 +00:00
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-757: Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade')"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Sciener",
"product": {
"product_data": [
{
"product_name": "TTLock App",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "6.4.5",
"version_value": "6.4.5"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://alephsecurity.com/2024/03/07/kontrol-lux-lock-2/",
"refsource": "MISC",
"name": "https://alephsecurity.com/2024/03/07/kontrol-lux-lock-2/"
}
]
},
"generator": {
"engine": "VINCE 3.0.11",
"env": "prod",
"origin": "https://cveawg.mitre.org/api/cve/CVE-2023-7005"
},
"source": {
"discovery": "UNKNOWN"
2023-12-20 15:01:12 +00:00
}
}