GHSA-3QV4-JM22-WQX7
Vulnerability from github – Published: 2024-03-21 18:32 – Updated: 2024-10-20 00:30
VLAI?
Details
The dormakaba Saflok system before the November 2023 software update allows an attacker to unlock arbitrary doors at a property via forged keycards, if the attacker has obtained one active or expired keycard for the specific property, aka the "Unsaflok" issue. This occurs, in part, because the key derivation function relies only on a UID. This affects, for example, Saflok MT, and the Confidant, Quantum, RT, and Saffire series.
Severity ?
5.6 (Medium)
{
"affected": [],
"aliases": [
"CVE-2024-29916"
],
"database_specific": {
"cwe_ids": [
"CWE-407"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-03-21T17:15:09Z",
"severity": "MODERATE"
},
"details": "The dormakaba Saflok system before the November 2023 software update allows an attacker to unlock arbitrary doors at a property via forged keycards, if the attacker has obtained one active or expired keycard for the specific property, aka the \"Unsaflok\" issue. This occurs, in part, because the key derivation function relies only on a UID. This affects, for example, Saflok MT, and the Confidant, Quantum, RT, and Saffire series.",
"id": "GHSA-3qv4-jm22-wqx7",
"modified": "2024-10-20T00:30:35Z",
"published": "2024-03-21T18:32:03Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29916"
},
{
"type": "WEB",
"url": "https://news.ycombinator.com/item?id=39779291"
},
{
"type": "WEB",
"url": "https://unsaflok.com"
},
{
"type": "WEB",
"url": "https://www.wired.com/story/saflok-hotel-lock-unsaflok-hack-technique"
},
{
"type": "WEB",
"url": "https://www.youtube.com/watch?v=4cx0RUV7i0s"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"type": "CVSS_V3"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…