Anviz Global M3 Outdoor RFID Access Control executes any command received from any source. No authentication/encryption is done. Attackers can fully interact with the device: for example, send the "open door" command, download the users list (which includes RFID codes and passcodes in cleartext), or update/create users. The same attack can be executed on a local network and over the internet (if the device is exposed on a public IP address).
References
Link Resource
https://github.com/wizlab-it/anviz-m3-rfid-cve-2019-11523-poc Mitigation Exploit Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2019-06-06T19:39:05

Updated: 2019-06-06T19:39:05

Reserved: 2019-04-25T00:00:00


Link: CVE-2019-11523

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2019-06-06T20:29:02.697

Modified: 2020-08-24T17:37:01.140


Link: CVE-2019-11523

JSON object: View

cve-icon Redhat Information

No data.