Vulnerability Description
An issue was discovered in the software on Vaultek Gun Safe VT20i products. There is no encryption of the session between the Android application and the safe. The website and marketing materials advertise that this communication channel is encrypted with "Highest Level Bluetooth Encryption" and "Data transmissions are secure via AES256 bit encryption." These claims, however, are not true. Moreover, AES256 bit encryption is not supported in the Bluetooth Low Energy (BLE) standard, so it would have to be at the application level. This lack of encryption allows an individual to learn the passcode by eavesdropping on the communications between the application and the safe.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Vaulteksafe | Vt20I Firmware | - |
| Vaulteksafe | Vt20I | - |
Related Weaknesses (CWE)
References
- https://vaulteksafe.com/index.php/cve-2017-17435/MitigationVendor Advisory
- https://www.twosixlabs.com/bluesteal-popping-gatt-safes/Third Party Advisory
- https://vaulteksafe.com/index.php/cve-2017-17435/MitigationVendor Advisory
- https://www.twosixlabs.com/bluesteal-popping-gatt-safes/Third Party Advisory
FAQ
What is CVE-2017-17436?
CVE-2017-17436 is a vulnerability with a CVSS score of 8.8 (HIGH). An issue was discovered in the software on Vaultek Gun Safe VT20i products. There is no encryption of the session between the Android application and the safe. The website and marketing materials adve...
How severe is CVE-2017-17436?
CVE-2017-17436 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-17436?
Check the references section above for vendor advisories and patch information. Affected products include: Vaulteksafe Vt20I Firmware, Vaulteksafe Vt20I.