Gửi #516881: IROAD Dashcam X series Authentication Bypass by Primary Weaknessthông tin

tiêu đềIROAD Dashcam X series Authentication Bypass by Primary Weakness
Mô tảBypassing of Device Pairing [CWE-798] for IROAD X Series The IROAD X series dashcam (ie X5, X6, etc) uses MAC address verification as the sole mechanism for recognizing paired devices, allowing attackers to bypass authentication. By capturing the MAC address of an already-paired device through ARP scanning or other means, an attacker can spoof the MAC address and connect to the dashcam without going through the pairing process. This enables full access to the device.
Nguồn⚠️ https://github.com/geo-chen/IROAD#finding-3-bypassing-of-device-pairing-cwe-798-for-iroad-x-series
Người dùng
 geochen (UID 78995)
Đệ trình08/03/2025 17:21 (cách đây 1 Năm)
Kiểm duyệt15/03/2025 19:22 (7 days later)
Trạng tháiđược chấp nhận
Mục VulDB299809 [IROAD Dash Cam X5/Dash Cam X6 đến 20250308 Device Pairing xác thực yếu]
điểm20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!