Some Sciener-based locks support plaintext message processing over Bluetooth Low Energy, allowing unencrypted malicious commands to be passed to the lock. These malicious commands, less then 16 bytes in length, will be processed by the lock as if they were encrypted communications. This can be further exploited by an attacker to compromise the lock's integrity.
Metrics
Affected Vendors & Products
References
History
Tue, 04 Nov 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 04 Nov 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sciener
Sciener kontrol Lux Firmware |
|
| CPEs | cpe:2.3:a:sciener:kontrol_lux_firmware:6.5:*:*:*:*:*:*:* | |
| Vendors & Products |
Sciener
Sciener kontrol Lux Firmware |
|
| Metrics |
ssvc
|
Mon, 26 Aug 2024 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: certcc
Published: 2024-03-15T17:07:48.318Z
Updated: 2025-11-04T18:22:11.492Z
Reserved: 2023-12-20T15:34:13.342Z
Link: CVE-2023-7009
Updated: 2025-11-04T18:22:11.492Z
Status : Awaiting Analysis
Published: 2024-03-15T17:15:07.810
Modified: 2025-11-04T19:16:26.080
Link: CVE-2023-7009
No data.