{ "id": "CVE-2023-7007", "sourceIdentifier": "cret@cert.org", "published": "2024-03-15T17:15:07.763", "lastModified": "2024-03-17T22:38:29.433", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sciener server does not validate connection requests from the GatewayG2, allowing an impersonation attack that provides the attacker the unlockKey field." }, { "lang": "es", "value": "El servidor Sciener no valida las solicitudes de conexi\u00f3n de GatewayG2, lo que permite un ataque de suplantaci\u00f3n de identidad que proporciona al atacante el campo unlockKey." } ], "metrics": {}, "references": [ { "url": "https://alephsecurity.com/2024/03/07/kontrol-lux-lock-2/", "source": "cret@cert.org" } ] }