CVE-2023-50124
Severity CVSS v4.0:
Pending analysis
Type:
CWE-798
Use of Hard-coded Credentials
Publication date:
11/01/2024
Last modified:
03/09/2024
Description
Flient Smart Door Lock v1.0 is vulnerable to Use of Default Credentials. Due to default credentials on a debug interface, in combination with certain design choices, an attacker can unlock the Flient Smart Door Lock by replacing the fingerprint that is stored on the scanner.
Impact
Base Score 3.x
6.80
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:h:flient:smart_lock_advanced:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:flient:smart_lock_advanced_firmware:1.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



