CVE-2019-9659

The Chuango 433 MHz burglar-alarm product line uses static codes in the RF remote control, allowing an attacker to arm, disarm, or trigger the alarm remotely via replay attacks, as demonstrated by Chuango branded products, and non-Chuango branded products such as the Eminent EM8617 OV2 Wifi Alarm System.
References
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:chuango:wifi_alarm_system_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:chuango:wifi_alarm_system:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:chuango:wifi\/cellular_smart_home_system_h4_plus_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:chuango:wifi\/cellular_smart_home_system_h4_plus:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:chuango:awv_plus_wifi_alarm_system_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:chuango:awv_plus_wifi_alarm_system:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:chuango:g5w_3g_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:chuango:g5w_3g:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:chuango:g5_plus_gsm\/sms\/rfid_touch_alarm_system_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:chuango:g5_plus_gsm\/sms\/rfid_touch_alarm_system:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:chuango:g3_gsm\/sms_alarm_system_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:chuango:g3_gsm\/sms_alarm_system:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:chuango:g5w_3g_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:chuango:g5w_3g:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:chuango:b11_dual-network_alarm_system_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:chuango:b11_dual-network_alarm_system:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:chuango:a8_pstn_alarm_system_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:chuango:a8_pstn_alarm_system:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:chuango:a11_pstn\/lcd\/rfid_touch_alarm_system_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:chuango:a11_pstn\/lcd\/rfid_touch_alarm_system:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:chuango:cg-105s_on-site_alarm_system_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:chuango:cg-105s_on-site_alarm_system:-:*:*:*:*:*:*:*

Configuration 12 (hide)

AND
cpe:2.3:o:eminent:em8617_ov2_wifi_alarm_system_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:eminent:em8617_ov2_wifi_alarm_system:-:*:*:*:*:*:*:*

Information

Published : 2019-03-11 08:29

Updated : 2021-07-21 04:39


NVD link : CVE-2019-9659

Mitre link : CVE-2019-9659


JSON object : View

CWE
CWE-294

Authentication Bypass by Capture-replay

Advertisement

dedicated server usa

Products Affected

chuango

  • g3_gsm\/sms_alarm_system_firmware
  • a11_pstn\/lcd\/rfid_touch_alarm_system
  • g5_plus_gsm\/sms\/rfid_touch_alarm_system
  • b11_dual-network_alarm_system
  • wifi_alarm_system
  • a11_pstn\/lcd\/rfid_touch_alarm_system_firmware
  • awv_plus_wifi_alarm_system
  • g5w_3g
  • b11_dual-network_alarm_system_firmware
  • a8_pstn_alarm_system
  • wifi\/cellular_smart_home_system_h4_plus_firmware
  • a8_pstn_alarm_system_firmware
  • g3_gsm\/sms_alarm_system
  • cg-105s_on-site_alarm_system_firmware
  • wifi_alarm_system_firmware
  • cg-105s_on-site_alarm_system
  • awv_plus_wifi_alarm_system_firmware
  • g5w_3g_firmware
  • g5_plus_gsm\/sms\/rfid_touch_alarm_system_firmware
  • wifi\/cellular_smart_home_system_h4_plus

eminent

  • em8617_ov2_wifi_alarm_system_firmware
  • em8617_ov2_wifi_alarm_system