CVE-2019-11523
06.06.2019, 20:29
Anviz Global M3 Outdoor RFID Access Control executes any command received from any source. No authentication/encryption is done. Attackers can fully interact with the device: for example, send the "open door" command, download the users list (which includes RFID codes and passcodes in cleartext), or update/create users. The same attack can be executed on a local network and over the internet (if the device is exposed on a public IP address).Enginsight
Vendor | Product | Version |
---|---|---|
anviz | m3_firmware | - |
𝑥
= Vulnerable software versions
Common Weakness Enumeration