6.8
CVE-2021-40170
- EPSS 0.25%
- Veröffentlicht 15.12.2021 07:15:07
- Zuletzt bearbeitet 21.11.2024 06:23:42
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
An RF replay attack vulnerability in the SecuritasHome home alarm system, version HPGW-G 0.0.2.23F BG_U-ITR-F1-BD_BL.A30.20181117, allows an attacker to trigger arbitrary system functionality by replaying previously recorded signals. This lets an adversary, among other things, disarm an armed system.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Securitashome ≫ Securitashome Alarm System Firmware Versionhpgw-g_0.0.2.23f_bg_u-itr-f1-bd_bl.a30.20181117
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.25% | 0.476 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 6.8 | 1.6 | 5.2 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H
|
| nvd@nist.gov | 5.8 | 8.6 | 4.9 |
AV:N/AC:M/Au:N/C:N/I:P/A:P
|
CWE-294 Authentication Bypass by Capture-replay
A capture-replay flaw exists when the design of the product makes it possible for a malicious user to sniff network traffic and bypass authentication by replaying it to the server in question to the same effect as the original message (or with minor changes).