Description
Tinxy Door Lock with firmware before 3.2 allow attackers to unlock a door by replaying an Unlock request that occurred when the attacker was previously authorized. In other words, door-access revocation is mishandled.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-30258 | Tinxy Door Lock with firmware before 3.2 allow attackers to unlock a door by replaying an Unlock request that occurred when the attacker was previously authorized. In other words, door-access revocation is mishandled. |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T10:26:16.183Z
Reserved: 2020-02-27T00:00:00.000Z
Link: CVE-2020-9438
No data.
Status : Modified
Published: 2020-06-23T15:15:13.547
Modified: 2024-11-21T05:40:38.637
Link: CVE-2020-9438
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD