提出 #516881: IROAD Dashcam X series Authentication Bypass by Primary Weakness情報

タイトルIROAD Dashcam X series Authentication Bypass by Primary Weakness
説明Bypassing of Device Pairing [CWE-798] for IROAD X Series The IROAD X series dashcam (ie X5, X6, etc) uses MAC address verification as the sole mechanism for recognizing paired devices, allowing attackers to bypass authentication. By capturing the MAC address of an already-paired device through ARP scanning or other means, an attacker can spoof the MAC address and connect to the dashcam without going through the pairing process. This enables full access to the device.
ソース⚠️ https://github.com/geo-chen/IROAD#finding-3-bypassing-of-device-pairing-cwe-798-for-iroad-x-series
ユーザー
 geochen (UID 78995)
送信2025年03月08日 17:21 (1 年 ago)
モデレーション2025年03月15日 19:22 (7 days later)
ステータス承諾済み
VulDBエントリ299809 [IROAD Dash Cam X5/Dash Cam X6 迄 20250308 Device Pairing 弱い認証]
ポイント20