Vulnerabilities (CVE)

Filtered by vendor Assaabloy Subscribe
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-26943 1 Assaabloy 2 Yale Keyless Smart Lock, Yale Keyless Smart Lock Firmware 2023-12-08 N/A 6.5 MEDIUM
Weak encryption mechanisms in RFID Tags in Yale Keyless Lock v1.0 allows attackers to create a cloned tag via physical proximity to the original.
CVE-2023-26942 1 Assaabloy 2 Yale Ia-210, Yale Ia-210 Firmware 2023-12-08 N/A 6.5 MEDIUM
Weak encryption mechanisms in RFID Tags in Yale IA-210 Alarm v1.0 allows attackers to create a cloned tag via physical proximity to the original.
CVE-2023-26941 1 Assaabloy 2 Yale Conexis L1, Yale Conexis L1 Firmware 2023-12-08 N/A 6.5 MEDIUM
Weak encryption mechanisms in RFID Tags in Yale Conexis L1 v1.1.0 allows attackers to create a cloned tag via physical proximity to the original.
CVE-2023-4392 1 Assaabloy 1 Control Id Gerencia Web 2023-08-24 N/A 5.3 MEDIUM
A vulnerability was found in Control iD Gerencia Web 1.30 and classified as problematic. Affected by this issue is some unknown functionality of the component Cookie Handler. The manipulation leads to cleartext storage of sensitive information. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-237380. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2023-33368 1 Assaabloy 1 Control Id Idsecure 2023-08-04 N/A 6.5 MEDIUM
Some API routes exists in Control ID IDSecure 4.7.26.0 and prior, exfiltrating sensitive information and passwords to users accessing these API routes.
CVE-2019-13604 1 Assaabloy 2 Hid Digitalpersona 4500, Hid Digitalpersona 4500 Firmware 2020-08-24 4.3 MEDIUM 5.9 MEDIUM
There is a short key vulnerability in HID Global DigitalPersona (formerly Crossmatch) U.are.U 4500 Fingerprint Reader v24. The key for obfuscating the fingerprint image is vulnerable to brute-force attacks. This allows an attacker to recover the key and decrypt that image using the key. Successful exploitation causes a sensitive biometric information leak.