An attacker with physical access to a BrilliantTS FUZE card (MCU firmware 0.1.73, BLE firmware 0.7.4) can unlock the card, extract credit card numbers, and tamper with data on the card via Bluetooth because no authentication is needed, as demonstrated by gatttool.
References
Link | Resource |
---|---|
https://blog.ice9.us/2018/04/stealing-credit-cards-from-fuze-bluetooth.html | Third Party Advisory |
https://ice9.us/advisories/ICE9-2018-001.txt | Third Party Advisory |
https://www.elttam.com/blog/fuzereview/#content | |
https://www.reddit.com/r/netsec/comments/89qrp1/stealing_credit_cards_from_fuze_via_bluetooth/ | Issue Tracking |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2018-04-04T00:00:00
Updated: 2023-08-31T22:10:16.240567
Reserved: 2018-03-28T00:00:00
Link: CVE-2018-9119
JSON object: View
NVD Information
Status : Modified
Published: 2018-04-04T18:29:02.433
Modified: 2023-08-31T23:15:21.857
Link: CVE-2018-9119
JSON object: View
Redhat Information
No data.
CWE