LOW · 3.7

CVE-2019-11334

An authentication bypass in website post requests in the Tzumi Electronics Klic Lock application 1.0.9 for mobile devices allows attackers to access resources (that are not otherwise accessible withou...

Vulnerability Description

An authentication bypass in website post requests in the Tzumi Electronics Klic Lock application 1.0.9 for mobile devices allows attackers to access resources (that are not otherwise accessible without proper authentication) via capture-replay. Physically proximate attackers can use this information to unlock unauthorized Tzumi Electronics Klic Smart Padlock Model 5686 Firmware 6.2.

CVSS Score

3.7

LOW

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
LOW
Integrity
NONE
Availability
NONE

Affected Products

VendorProductVersions
TzumiKlic Lock1.0.9
TzumiKlic Smart Padlock Model 5686 Firmware6.2
TzumiKlic Smart Padlock Model 5686-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2019-11334?

CVE-2019-11334 is a vulnerability with a CVSS score of 3.7 (LOW). An authentication bypass in website post requests in the Tzumi Electronics Klic Lock application 1.0.9 for mobile devices allows attackers to access resources (that are not otherwise accessible withou...

How severe is CVE-2019-11334?

CVE-2019-11334 has been rated LOW with a CVSS base score of 3.7/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2019-11334?

Check the references section above for vendor advisories and patch information. Affected products include: Tzumi Klic Lock, Tzumi Klic Smart Padlock Model 5686 Firmware, Tzumi Klic Smart Padlock Model 5686.