Описание
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules, when BreeZ is used, do not require authentication for reading the site security key, which allows physically proximate attackers to spoof communication by obtaining this key after use of direct hardware access or manual-setup mode.
Комментарий
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:h:oleumtech:sensor_wireless_i\/o_module:-:*:*:*:*:*:*:*
cpe:2.3:h:oleumtech:wio_dh2_wireless_gateway:-:*:*:*:*:*:*:*
EPSS
Процентиль: 24%
0.00081
Низкий
7.2 High
CVSS2
7.2 High
CVSS2
Дефекты
CWE-320
NVD-CWE-Other
Связанные уязвимости
github
больше 3 лет назад
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules, when BreeZ is used, do not require authentication for reading the site security key, which allows physically proximate attackers to spoof communication by obtaining this key after use of direct hardware access or manual-setup mode.
EPSS
Процентиль: 24%
0.00081
Низкий
7.2 High
CVSS2
7.2 High
CVSS2
Дефекты
CWE-320
NVD-CWE-Other