CVE-2018-16242

oBike relies on Hangzhou Luoping Smart Locker to lock bicycles, which allows attackers to bypass the locking mechanism by using Bluetooth Low Energy (BLE) to replay ciphertext based on a predictable nonce used in the locking protocol.
References
Link Resource
https://seclists.org/bugtraq/2018/Sep/30 Exploit Mailing List Third Party Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:o.bike:smart_locker_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:o.bike:smart_locker:-:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:o.bike:obike-stationless_bike_sharing:2.5.4:*:*:*:*:android:*:*

Information

Published : 2018-09-14 14:29

Updated : 2019-10-02 17:03


NVD link : CVE-2018-16242

Mitre link : CVE-2018-16242


JSON object : View

CWE
CWE-294

Authentication Bypass by Capture-replay

Advertisement

dedicated server usa

Products Affected

o.bike

  • smart_locker
  • smart_locker_firmware
  • obike-stationless_bike_sharing