CVE-2021-20107
Severity CVSS v4.0:
Pending analysis
Type:
CWE-306
Missing Authentication for Critical Function
Publication date:
30/06/2021
Last modified:
28/06/2022
Description
There exists an unauthenticated BLE Interface in Sloan SmartFaucets including Optima EAF, Optima ETF/EBF, BASYS EFX, and Flushometers including SOLIS. The vulnerability allows for unauthenticated kinetic effects and information disclosure on the faucets. It is possible to use the Bluetooth Low Energy (BLE) connectivity to read and write to many BLE characteristics on the device. Some of these control the flow of water, the sensitivity of the sensors, and information about maintenance.
Impact
Base Score 3.x
5.40
Severity 3.x
MEDIUM
Base Score 2.0
4.80
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:sloan:optima_eaf-100_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:sloan:optima_eaf-100:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:sloan:optima_eaf-150_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:sloan:optima_eaf-150:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:sloan:optima_eaf-200_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:sloan:optima_eaf-200:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:sloan:optima_eaf-225_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:sloan:optima_eaf-225:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:sloan:optima_eaf-250_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:sloan:optima_eaf-250:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:sloan:optima_eaf-275_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:sloan:optima_eaf-275:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:sloan:optima_eaf-350_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:sloan:optima_eaf-350:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:sloan:optima_eaf-700_firmware:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



