Incorrect access control in AMAG Symmetry Door Edge Network Controllers (EN-1DBC Boot App 23611 03.60 and STD App 23603 03.60; EN-2DBC Boot App 24451 01.00 and STD App 2461 01.00) enables remote attackers to execute door controller commands (e.g., lock, unlock, add ID card value) by sending unauthenticated requests to the affected devices via Serial over TCP/IP, as demonstrated by a Ud command.
References
Link | Resource |
---|---|
https://www.secureworks.com/research/advisory-2017-001 | Third Party Advisory |
https://hushcon.com/schedule.html | Not Applicable |
https://github.com/lixmk/Concierge | Exploit |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Information
Published : 2017-12-09 17:29
Updated : 2019-10-02 17:03
NVD link : CVE-2017-16241
Mitre link : CVE-2017-16241
JSON object : View
CWE
CWE-306
Missing Authentication for Critical Function
Products Affected
amag
- en-2dbc_firmware
- std
- std_firmware
- en-1dbc
- en-1dbc_firmware
- en-2dbc