cvelist/2023/7xxx/CVE-2023-7005.json
2024-12-19 18:00:59 +00:00

72 lines
2.3 KiB
JSON

{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-7005",
"ASSIGNER": "cert@cert.org",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A specially crafted message can be sent to the TTLock App that downgrades the encryption protocol used for communication, and can be utilized to compromise the lock, such as through revealing the unlockKey field."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-757: Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade')"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Sciener",
"product": {
"product_data": [
{
"product_name": "TTLock App",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "6.4.5",
"version_value": "6.4.5"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://alephsecurity.com/2024/03/07/kontrol-lux-lock-2/",
"refsource": "MISC",
"name": "https://alephsecurity.com/2024/03/07/kontrol-lux-lock-2/"
}
]
},
"generator": {
"engine": "VINCE 3.0.11",
"env": "prod",
"origin": "https://cveawg.mitre.org/api/cve/CVE-2023-7005"
},
"source": {
"discovery": "UNKNOWN"
}
}