Vulnerability Description
Sciener locks' firmware update mechanism do not authenticate or validate firmware updates if passed to the lock through the Bluetooth Low Energy service. A challenge request can be sent to the lock with a command to prepare for an update, rather than an unlock request, allowing an attacker to compromise the device.
CVSS Score
CRITICAL
References
- https://alephsecurity.com/2024/03/07/kontrol-lux-lock-2/
- https://alephsecurity.com/2024/03/07/kontrol-lux-lock-2/
- https://www.kb.cert.org/vuls/id/949046
FAQ
What is CVE-2023-7017?
CVE-2023-7017 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Sciener locks' firmware update mechanism do not authenticate or validate firmware updates if passed to the lock through the Bluetooth Low Energy service. A challenge request can be sent to the lock wi...
How severe is CVE-2023-7017?
CVE-2023-7017 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2023-7017?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.