Lucene search

K

Secvest Wireless Alarm System Fuaa50000 Firmware Security Vulnerabilities

cve
cve

CVE-2019-14261

An issue was discovered on ABUS Secvest FUAA50000 3.01.01 devices. Due to an insufficient implementation of jamming detection, an attacker is able to suppress correctly received RF messages sent between wireless peripheral components, e.g., wireless detectors or remote controls, and the ABUS Secves...

7.5CVSS

7.5AI Score

0.004EPSS

2019-09-03 06:15 PM
90
cve
cve

CVE-2019-9860

Due to unencrypted signal communication and predictability of rolling codes, an attacker can "desynchronize" an ABUS Secvest wireless remote control (FUBE50014 or FUBE50015) relative to its controlled Secvest wireless alarm system FUAA50000 3.01.01, so that sent commands by the remote control are n...

7.5CVSS

7.6AI Score

0.001EPSS

2019-03-27 03:29 PM
22
cve
cve

CVE-2019-9861

Due to the use of an insecure RFID technology (MIFARE Classic), ABUS proximity chip keys (RFID tokens) of the ABUS Secvest FUAA50000 wireless alarm system can easily be cloned and used to deactivate the alarm system in an unauthorized way.

8.1CVSS

7.9AI Score

0.001EPSS

2019-05-14 05:29 PM
34
cve
cve

CVE-2019-9862

An issue was discovered on ABUS Secvest wireless alarm system FUAA50000 3.01.01 in conjunction with Secvest remote control FUBE50014 or FUBE50015. Because "encrypted signal transmission" is missing, an attacker is able to eavesdrop sensitive data as cleartext (for instance, the current rolling code...

6.5CVSS

6.6AI Score

0.001EPSS

2019-03-27 02:29 PM
20
cve
cve

CVE-2019-9863

Due to the use of an insecure algorithm for rolling codes in the ABUS Secvest wireless alarm system FUAA50000 3.01.01 and its remote controls FUBE50014 and FUBE50015, an attacker is able to predict valid future rolling codes, and can thus remotely control the alarm system in an unauthorized way.

9.8CVSS

9.3AI Score

0.007EPSS

2019-03-27 02:29 PM
24
cve
cve

CVE-2020-28973

The ABUS Secvest wireless alarm system FUAA50000 (v3.01.17) fails to properly authenticate some requests to its built-in HTTPS interface. Someone can use this vulnerability to obtain sensitive information from the system, such as usernames and passwords. This information can then be used to reconfi...

7.5CVSS

7.2AI Score

0.002EPSS

2021-04-21 07:15 PM
19
7