Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
hozard alarm system 1.0 vulnerabilities and exploits
(subscribe to this query)
8.1
CVSSv3
CVE-2023-50123
The number of attempts to bring the Hozard Alarm system (alarmsystemen) v1.0 to a disarmed state is not limited. This could allow an malicious user to perform a brute force on the SMS authentication, to bring the alarm system to a disarmed state.
Hozard Alarm System 1.0
5.9
CVSSv3
CVE-2023-50125
A default engineer password set on the Hozard alarm system (Alarmsysteem) v1.0 allows an malicious user to bring the alarm system to a disarmed state.
Hozard Alarm System 1.0
6.5
CVSSv3
CVE-2023-50126
Missing encryption in the RFID tags of the Hozard alarm system (Alarmsysteem) v1.0 allow malicious users to create a cloned tag via brief physical proximity to one of the original tags, which results in an attacker being able to bring the alarm system to a disarmed state.
Hozard Alarm System 1.0
5.9
CVSSv3
CVE-2023-50127
Hozard alarm system (Alarmsysteem) v1.0 is vulnerable to Improper Authentication. Commands sent via the SMS functionality are accepted from random phone numbers, which allows an malicious user to bring the alarm system to a disarmed state from any given phone number.
Hozard Alarm System 1.0
5.3
CVSSv3
CVE-2023-50128
The remote keyless system of the Hozard alarm system (alarmsystemen) v1.0 sends an identical radio frequency signal for each request, which results in an attacker being able to conduct replay attacks to bring the alarm system to a disarmed state.
Hozard Alarm System 1.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
XXE
CVE-2024-34490
SQL injection
CVE-2024-34488
CVE-2024-4507
CVE-2023-7028
CVE-2024-23187
TCP
CVE-2024-4439
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started