| Título | IROAD Dashcam X series Authentication Bypass by Primary Weakness |
|---|
| Descrição | Bypassing of Device Pairing [CWE-798] for IROAD X Series
The IROAD X series dashcam (ie X5, X6, etc) uses MAC address verification as the sole mechanism for recognizing paired devices, allowing attackers to bypass authentication. By capturing the MAC address of an already-paired device through ARP scanning or other means, an attacker can spoof the MAC address and connect to the dashcam without going through the pairing process. This enables full access to the device. |
|---|
| Fonte | ⚠️ https://github.com/geo-chen/IROAD#finding-3-bypassing-of-device-pairing-cwe-798-for-iroad-x-series |
|---|
| Utilizador | geochen (UID 78995) |
|---|
| Submissão | 08/03/2025 17h21 (há 1 Ano) |
|---|
| Moderação | 15/03/2025 19h22 (7 days later) |
|---|
| Estado | Aceite |
|---|
| Entrada VulDB | 299809 [IROAD Dash Cam X5/Dash Cam X6 até 20250308 Device Pairing Autenticação fraca] |
|---|
| Pontos | 20 |
|---|