3 results (0.003 seconds)

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 3

The remote keyfob system on Nissan Sylphy Classic 2021 sends the same RF signal for each door-open request, which allows for a replay attack. NOTE: the vendor's position is that this cannot be reproduced with genuine Nissan parts: for example, the combination of keyfob and door handle shown in the exploit demonstration does not match any technology that Nissan provides to customers. • https://chaos-lab.blogspot.com/2023/05/nissan-sylphy-classic-2021-fixed-code.html https://twitter.com/Kevin2600/status/1658059570806415365 https://www.youtube.com/watch?v=GG1utSdYG1k • CWE-294: Authentication Bypass by Capture-replay •

CVSS: 6.4EPSS: 0%CPEs: 6EXPL: 4

The Remote Keyless Entry (RKE) receiving unit on certain Nissan, Kia, and Hyundai vehicles through 2017 allows remote attackers to perform unlock operations and force a resynchronization after capturing two consecutive valid key fob signals over the radio, aka a RollBack attack. The attacker retains the ability to unlock indefinitely. La unidad receptora de entrada remota sin llave (RKE) en determinados vehículos Nissan, Kia y Hyundai versiones hasta 2017, permite a atacantes remotos llevar a cabo operaciones de desbloqueo y forzar una resincronización después de capturar dos señales válidas consecutivas del llavero a través de la radio, también se conoce como un ataque RollBack. El atacante conserva la capacidad de desbloquear indefinidamente. • https://hackaday.com/2022/08/17/rollback-breaks-into-your-car https://medium.com/codex/rollback-a-new-time-agnostic-replay-attack-against-the-automotive-remote-keyless-entry-systems-df5f99ba9490 https://www.blackhat.com/us-22/briefings/schedule/#rollback---a-new-time-agnostic-replay-attack-against-the-automotive-remote-keyless-entry-systems-27185 https://www.pcmag.com/news/is-your-car-key-fob-vulnerable-to-this-simple-replay-attack https://www.youtube.com/playlist?list=PLYodcy84oQL1gxwiuRm13xRXxTQL9cO5t • CWE-294: Authentication Bypass by Capture-replay •

CVSS: 5.9EPSS: 0%CPEs: 2EXPL: 0

The Access CX App for Android prior to 2.0.0.1 and for iOS prior to 2.0.2 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. La aplicación Access CX, para Android versiones anteriores a la 2.0.0.1 y para iOS versiones anteriores a la 2.0.2, no verifica los certificados X.509 de servidores SSL, lo que permite a los atacantes man-in-the-middle falsificar servidores y obtener información confidencial a través de un certificado manipulado. • http://jvn.jp/en/jp/JVN82619692/index.html http://www.securityfocus.com/bid/96615 • CWE-295: Improper Certificate Validation •