CVE-2022-30111

Due to the use of an insecure algorithm for rolling codes in MCK Smartlock 1.0, allows attackers to unlock the mechanism via replay attacks.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mck_smartlock_project:mck_smartlock:1.0:*:*:*:*:*:*:*

History

21 Nov 2024, 07:02

Type Values Removed Values Added
References () https://tiger-team-1337.blogspot.com/2022/05/rf-remote-mck-lock-predictable-rolling.html - Exploit, Third Party Advisory () https://tiger-team-1337.blogspot.com/2022/05/rf-remote-mck-lock-predictable-rolling.html - Exploit, Third Party Advisory
References () https://twitter.com/Kevin2600/status/1495007534419038213 - Exploit, Third Party Advisory () https://twitter.com/Kevin2600/status/1495007534419038213 - Exploit, Third Party Advisory
References () https://www.youtube.com/watch?v=EruaGuE-cWI - Exploit, Third Party Advisory () https://www.youtube.com/watch?v=EruaGuE-cWI - Exploit, Third Party Advisory

Information

Published : 2022-05-18 18:15

Updated : 2024-11-21 07:02


NVD link : CVE-2022-30111

Mitre link : CVE-2022-30111

CVE.ORG link : CVE-2022-30111


JSON object : View

Products Affected

mck_smartlock_project

  • mck_smartlock
CWE
CWE-327

Use of a Broken or Risky Cryptographic Algorithm