5.3
CVE-2018-16242
- EPSS 0.07%
- Veröffentlicht 14.09.2018 21:29:03
- Zuletzt bearbeitet 21.11.2024 03:52:21
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
oBike relies on Hangzhou Luoping Smart Locker to lock bicycles, which allows attackers to bypass the locking mechanism by using Bluetooth Low Energy (BLE) to replay ciphertext based on a predictable nonce used in the locking protocol.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
O.Bike ≫ Smart Locker Firmware Version-
O.Bike ≫ Obike-stationless Bike Sharing Version2.5.4 SwPlatformandroid
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.07% | 0.216 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 5.3 | 1.6 | 3.6 |
CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
|
| nvd@nist.gov | 2.9 | 5.5 | 2.9 |
AV:A/AC:M/Au:N/C:N/I:P/A:N
|
CWE-294 Authentication Bypass by Capture-replay
A capture-replay flaw exists when the design of the product makes it possible for a malicious user to sniff network traffic and bypass authentication by replaying it to the server in question to the same effect as the original message (or with minor changes).