This CPE summary could be partial or incomplete. Please contact us for a detailed listing.
Summary
Detail | |||
---|---|---|---|
Vendor | Chuango | First view | 2019-03-11 |
Product | g5 Plus Gsm/Sms/Rfid Touch Alarm System Firmware | Last view | 2019-03-11 |
Version | - | Type | Os |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:o:chuango:g5_plus_gsm/sms/rfid_touch_alarm_system_firmware |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
9.1 | 2019-03-11 | CVE-2019-9659 | The Chuango 433 MHz burglar-alarm product line uses static codes in the RF remote control, allowing an attacker to arm, disarm, or trigger the alarm remotely via replay attacks, as demonstrated by Chuango branded products, and non-Chuango branded products such as the Eminent EM8617 OV2 Wifi Alarm System. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
100% (1) | CWE-294 | Authentication Bypass by Capture-replay |