Hozard

Alarm System

5 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.21%
  • Veröffentlicht 11.01.2024 21:15:10
  • Zuletzt bearbeitet 21.11.2024 08:36:33

The number of attempts to bring the Hozard Alarm system (alarmsystemen) v1.0 to a disarmed state is not limited. This could allow an attacker to perform a brute force on the SMS authentication, to bring the alarm system to a disarmed state.

  • EPSS 0.2%
  • Veröffentlicht 11.01.2024 21:15:10
  • Zuletzt bearbeitet 21.11.2024 08:36:33

A default engineer password set on the Hozard alarm system (Alarmsysteem) v1.0 allows an attacker to bring the alarm system to a disarmed state.

  • EPSS 0.03%
  • Veröffentlicht 11.01.2024 21:15:10
  • Zuletzt bearbeitet 03.06.2025 15:15:45

Missing encryption in the RFID tags of the Hozard alarm system (Alarmsysteem) v1.0 allow attackers to create a cloned tag via brief physical proximity to one of the original tags, which results in an attacker being able to bring the alarm system to a...

Exploit
  • EPSS 0.14%
  • Veröffentlicht 11.01.2024 21:15:10
  • Zuletzt bearbeitet 21.11.2024 08:36:34

Hozard alarm system (Alarmsysteem) v1.0 is vulnerable to Improper Authentication. Commands sent via the SMS functionality are accepted from random phone numbers, which allows an attacker to bring the alarm system to a disarmed state from any given ph...

  • EPSS 0.02%
  • Veröffentlicht 11.01.2024 21:15:10
  • Zuletzt bearbeitet 21.11.2024 08:36:34

The remote keyless system of the Hozard alarm system (alarmsystemen) v1.0 sends an identical radio frequency signal for each request, which results in an attacker being able to conduct replay attacks to bring the alarm system to a disarmed state.