9.8
CVSSv3

CVE-2019-11523

Published: 06/06/2019 Updated: 24/08/2020
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Anviz Global M3 Outdoor RFID Access Control executes any command received from any source. No authentication/encryption is done. Attackers can fully interact with the device: for example, send the "open door" command, download the users list (which includes RFID codes and passcodes in cleartext), or update/create users. The same attack can be executed on a local network and over the internet (if the device is exposed on a public IP address).

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

anviz m3_firmware -

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> Full Disclosure mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Anviz M3 RFID Access Control security issues <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: Marco &lt;se ...

Github Repositories

Anviz M3 RFID CVE-2019-11523 PoC

Anviz M3 RFID Access Control security issues Security issues have been found in the Anviz M3 RFID Access Control device when working in standalone mode connected to a TCP/IP network, that could lead to access control bypass and private informations leakage and alteration Advisory information TITLE: Anviz M3 RFID Access Control security issues ADVISORY URL: githubcom/w