CVE-2023-36483

Authorization bypass can be achieved by session ID prediction in MASmobile Classic Android  version 1.16.18 and earlier and MASmobile Classic iOS version 1.7.24 and earlier which allows remote attackers to retrieve sensitive data  including customer data, security system status, and event history.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:honeywell:masmobile_asp.net_services:*:*:*:*:*:*:*:*
cpe:2.3:a:honeywell:masmobile_classic:*:*:*:*:*:iphone_os:*:*
cpe:2.3:a:honeywell:masmobile_classic:*:*:*:*:*:android:*:*

History

18 Feb 2026, 14:26

Type Values Removed Values Added
CPE cpe:2.3:a:honeywell:masmobile_asp.net_services:*:*:*:*:*:*:*:*
cpe:2.3:a:honeywell:masmobile_classic:*:*:*:*:*:android:*:*
cpe:2.3:a:honeywell:masmobile_classic:*:*:*:*:*:iphone_os:*:*
First Time Honeywell
Honeywell masmobile Asp.net Services
Honeywell masmobile Classic
References () https://www.corporate.carrier.com/product-security/advisories-resources/ - () https://www.corporate.carrier.com/product-security/advisories-resources/ - Vendor Advisory, Not Applicable

21 Nov 2024, 08:09

Type Values Removed Values Added
References () https://www.corporate.carrier.com/product-security/advisories-resources/ - () https://www.corporate.carrier.com/product-security/advisories-resources/ -

21 Mar 2024, 22:15

Type Values Removed Values Added
References
  • {'url': 'https://www.corporate.carrier.com/Images/CARR-PSA-MASMobile%20Classic%20Authorization%20Bypass-012-0623_tcm558-203964.pdf', 'name': 'https://www.corporate.carrier.com/Images/CARR-PSA-MASMobile%20Classic%20Authorization%20Bypass-012-0623_tcm558-203964.pdf', 'tags': [], 'refsource': ''}
  • () https://www.corporate.carrier.com/product-security/advisories-resources/ -
Summary An authorization bypass was discovered in the Carrier MASmobile Classic application through 1.16.18 for Android, MASmobile Classic app through 1.7.24 for iOS, and MAS ASP.Net Services through 1.9. It can be achieved via session ID prediction, allowing remote attackers to retrieve sensitive data including customer data, security system status, and event history. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. The affected products cannot simply be updated; they must be removed, but can be replaced by other Carrier software as explained in the Carrier advisory. Authorization bypass can be achieved by session ID prediction in MASmobile Classic Android  version 1.16.18 and earlier and MASmobile Classic iOS version 1.7.24 and earlier which allows remote attackers to retrieve sensitive data  including customer data, security system status, and event history.

16 Mar 2024, 05:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-16 05:15

Updated : 2026-02-18 14:26


NVD link : CVE-2023-36483

Mitre link : CVE-2023-36483

CVE.ORG link : CVE-2023-36483


JSON object : View

Products Affected

honeywell

  • masmobile_asp.net_services
  • masmobile_classic
CWE
CWE-639

Authorization Bypass Through User-Controlled Key