Filtered by vendor Anviz
Subscribe
Search
Total
4 CVE
| CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
|---|---|---|---|---|---|
| CVE-2019-11523 | 1 Anviz | 2 M3, M3 Firmware | 2020-08-24 | 7.5 HIGH | 9.8 CRITICAL |
| Anviz Global M3 Outdoor RFID Access Control executes any command received from any source. No authentication/encryption is done. Attackers can fully interact with the device: for example, send the "open door" command, download the users list (which includes RFID codes and passcodes in cleartext), or update/create users. The same attack can be executed on a local network and over the internet (if the device is exposed on a public IP address). | |||||
| CVE-2019-12392 | 1 Anviz | 1 Anviz Firmware | 2020-08-24 | 7.5 HIGH | 9.8 CRITICAL |
| Anviz access control devices allow remote attackers to issue commands without a password. | |||||
| CVE-2019-12518 | 1 Anviz | 1 Crosschex | 2020-02-13 | 10.0 HIGH | 9.8 CRITICAL |
| Anviz CrossChex access control management software 4.3.8.0 and 4.3.12 is vulnerable to a buffer overflow vulnerability. | |||||
| CVE-2019-12394 | 1 Anviz | 1 Management System | 2019-12-12 | 7.5 HIGH | 9.8 CRITICAL |
| Anviz access control devices allow unverified password change which allows remote attackers to change the administrator password without prior authentication. | |||||
