제출 #516881: IROAD Dashcam X series Authentication Bypass by Primary Weakness정보

제목IROAD Dashcam X series Authentication Bypass by Primary Weakness
설명Bypassing of Device Pairing [CWE-798] for IROAD X Series The IROAD X series dashcam (ie X5, X6, etc) uses MAC address verification as the sole mechanism for recognizing paired devices, allowing attackers to bypass authentication. By capturing the MAC address of an already-paired device through ARP scanning or other means, an attacker can spoof the MAC address and connect to the dashcam without going through the pairing process. This enables full access to the device.
원천⚠️ https://github.com/geo-chen/IROAD#finding-3-bypassing-of-device-pairing-cwe-798-for-iroad-x-series
사용자
 geochen (UID 78995)
제출2025. 03. 08. PM 05:21 (1 년도 ago)
모더레이션2025. 03. 15. PM 07:22 (7 days later)
상태수락
VulDB 항목299809 [IROAD Dash Cam X5/Dash Cam X6 까지 20250308 Device Pairing 약한 인증]
포인트들20