The wireless-communication feature of the ABUS Secvest FUBE50001 device does not encrypt sensitive data such as PIN codes or IDs of used proximity chip keys (RFID tokens). This makes it easier for an attacker to disarm the wireless alarm system.
References
| Link | Resource |
|---|---|
| https://www.youtube.com/watch?v=kCqAVYyahLc | Exploit Third Party Advisory |
| https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-014.txt | Exploit Third Party Advisory |
| http://seclists.org/fulldisclosure/2020/Jun/26 | Third Party Advisory |
| http://packetstormsecurity.com/files/158204/ABUS-Secvest-Wireless-Control-Device-Missing-Encryption.html | Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
Information
Published : 2020-06-17 20:15
Updated : 2021-07-21 11:39
NVD link : CVE-2020-14157
Mitre link : CVE-2020-14157
JSON object : View
Products Affected
abus
- secvest_wireless_control_fube50001
- secvest_wireless_control_fube50001_firmware
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
