Vulnerability Description
An authentication bypass in website post requests in the Tzumi Electronics Klic Lock application 1.0.9 for mobile devices allows attackers to access resources (that are not otherwise accessible without proper authentication) via capture-replay. Physically proximate attackers can use this information to unlock unauthorized Tzumi Electronics Klic Smart Padlock Model 5686 Firmware 6.2.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tzumi | Klic Lock | 1.0.9 |
| Tzumi | Klic Smart Padlock Model 5686 Firmware | 6.2 |
| Tzumi | Klic Smart Padlock Model 5686 | - |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/153280/Tzumi-Electronics-Klic-Lock-AuthentiExploitThird Party AdvisoryVDB Entry
- https://github.com/whitehatdefenses/KlicUnLockExploitThird Party Advisory
- http://packetstormsecurity.com/files/153280/Tzumi-Electronics-Klic-Lock-AuthentiExploitThird Party AdvisoryVDB Entry
- https://github.com/whitehatdefenses/KlicUnLockExploitThird Party Advisory
FAQ
What is CVE-2019-11334?
CVE-2019-11334 is a vulnerability with a CVSS score of 3.7 (LOW). An authentication bypass in website post requests in the Tzumi Electronics Klic Lock application 1.0.9 for mobile devices allows attackers to access resources (that are not otherwise accessible withou...
How severe is CVE-2019-11334?
CVE-2019-11334 has been rated LOW with a CVSS base score of 3.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-11334?
Check the references section above for vendor advisories and patch information. Affected products include: Tzumi Klic Lock, Tzumi Klic Smart Padlock Model 5686 Firmware, Tzumi Klic Smart Padlock Model 5686.