NA

CVE-2023-7009

Published: 15/03/2024 Updated: 17/03/2024

Vulnerability Summary

Some Sciener-based locks support plaintext message processing over Bluetooth Low Energy, allowing unencrypted malicious commands to be passed to the lock. These malicious commands, less then 16 bytes in length, will be processed by the lock as if they were encrypted communications. This can be further exploited by an malicious user to compromise the lock's integrity.