Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2019-9659

Опубликовано: 11 мар. 2019
Источник: nvd
CVSS3: 9.1
CVSS2: 6.4
EPSS Низкий

Описание

The Chuango 433 MHz burglar-alarm product line uses static codes in the RF remote control, allowing an attacker to arm, disarm, or trigger the alarm remotely via replay attacks, as demonstrated by Chuango branded products, and non-Chuango branded products such as the Eminent EM8617 OV2 Wifi Alarm System.

Уязвимые конфигурации

Конфигурация 1

Одновременно

cpe:2.3:o:chuango:wifi_alarm_system_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:chuango:wifi_alarm_system:-:*:*:*:*:*:*:*
Конфигурация 2

Одновременно

cpe:2.3:o:chuango:wifi\/cellular_smart_home_system_h4_plus_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:chuango:wifi\/cellular_smart_home_system_h4_plus:-:*:*:*:*:*:*:*
Конфигурация 3

Одновременно

cpe:2.3:o:chuango:awv_plus_wifi_alarm_system_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:chuango:awv_plus_wifi_alarm_system:-:*:*:*:*:*:*:*
Конфигурация 4

Одновременно

cpe:2.3:o:chuango:g5w_3g_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:chuango:g5w_3g:-:*:*:*:*:*:*:*
Конфигурация 5

Одновременно

cpe:2.3:o:chuango:g5_plus_gsm\/sms\/rfid_touch_alarm_system_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:chuango:g5_plus_gsm\/sms\/rfid_touch_alarm_system:-:*:*:*:*:*:*:*
Конфигурация 6

Одновременно

cpe:2.3:o:chuango:g3_gsm\/sms_alarm_system_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:chuango:g3_gsm\/sms_alarm_system:-:*:*:*:*:*:*:*
Конфигурация 7

Одновременно

cpe:2.3:o:chuango:g5w_3g_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:chuango:g5w_3g:-:*:*:*:*:*:*:*
Конфигурация 8

Одновременно

cpe:2.3:o:chuango:b11_dual-network_alarm_system_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:chuango:b11_dual-network_alarm_system:-:*:*:*:*:*:*:*
Конфигурация 9

Одновременно

cpe:2.3:o:chuango:a8_pstn_alarm_system_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:chuango:a8_pstn_alarm_system:-:*:*:*:*:*:*:*
Конфигурация 10

Одновременно

cpe:2.3:o:chuango:a11_pstn\/lcd\/rfid_touch_alarm_system_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:chuango:a11_pstn\/lcd\/rfid_touch_alarm_system:-:*:*:*:*:*:*:*
Конфигурация 11

Одновременно

cpe:2.3:o:chuango:cg-105s_on-site_alarm_system_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:chuango:cg-105s_on-site_alarm_system:-:*:*:*:*:*:*:*
Конфигурация 12

Одновременно

cpe:2.3:o:eminent:em8617_ov2_wifi_alarm_system_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:eminent:em8617_ov2_wifi_alarm_system:-:*:*:*:*:*:*:*

EPSS

Процентиль: 51%
0.0028
Низкий

9.1 Critical

CVSS3

6.4 Medium

CVSS2

Дефекты

CWE-294

Связанные уязвимости

CVSS3: 9.1
github
больше 3 лет назад

The Chuango 433 MHz burglar-alarm product line uses static codes in the RF remote control, allowing an attacker to arm, disarm, or trigger the alarm remotely via replay attacks, as demonstrated by Chuango branded products, and non-Chuango branded products such as the Eminent EM8617 OV2 Wifi Alarm System.

EPSS

Процентиль: 51%
0.0028
Низкий

9.1 Critical

CVSS3

6.4 Medium

CVSS2

Дефекты

CWE-294