CVE-2019-9659

The Chuango 433 MHz burglar-alarm product line uses static codes in the RF remote control, allowing an attacker to arm, disarm, or trigger the alarm remotely via replay attacks, as demonstrated by Chuango branded products, and non-Chuango branded products such as the Eminent EM8617 OV2 Wifi Alarm System.
References
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:chuango:wifi_alarm_system_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:chuango:wifi_alarm_system:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:chuango:wifi\/cellular_smart_home_system_h4_plus_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:chuango:wifi\/cellular_smart_home_system_h4_plus:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:chuango:awv_plus_wifi_alarm_system_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:chuango:awv_plus_wifi_alarm_system:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:chuango:g5w_3g_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:chuango:g5w_3g:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:chuango:g5_plus_gsm\/sms\/rfid_touch_alarm_system_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:chuango:g5_plus_gsm\/sms\/rfid_touch_alarm_system:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:chuango:g3_gsm\/sms_alarm_system_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:chuango:g3_gsm\/sms_alarm_system:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:chuango:g5w_3g_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:chuango:g5w_3g:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:chuango:b11_dual-network_alarm_system_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:chuango:b11_dual-network_alarm_system:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:chuango:a8_pstn_alarm_system_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:chuango:a8_pstn_alarm_system:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:chuango:a11_pstn\/lcd\/rfid_touch_alarm_system_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:chuango:a11_pstn\/lcd\/rfid_touch_alarm_system:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:chuango:cg-105s_on-site_alarm_system_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:chuango:cg-105s_on-site_alarm_system:-:*:*:*:*:*:*:*

Configuration 12 (hide)

AND
cpe:2.3:o:eminent:em8617_ov2_wifi_alarm_system_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:eminent:em8617_ov2_wifi_alarm_system:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2019-03-11 15:29

Updated : 2024-02-04 20:20


NVD link : CVE-2019-9659

Mitre link : CVE-2019-9659

CVE.ORG link : CVE-2019-9659


JSON object : View

Products Affected

eminent

  • em8617_ov2_wifi_alarm_system
  • em8617_ov2_wifi_alarm_system_firmware

chuango

  • wifi_alarm_system_firmware
  • b11_dual-network_alarm_system_firmware
  • cg-105s_on-site_alarm_system_firmware
  • wifi\/cellular_smart_home_system_h4_plus_firmware
  • cg-105s_on-site_alarm_system
  • awv_plus_wifi_alarm_system_firmware
  • b11_dual-network_alarm_system
  • g5w_3g_firmware
  • g5_plus_gsm\/sms\/rfid_touch_alarm_system_firmware
  • a8_pstn_alarm_system_firmware
  • awv_plus_wifi_alarm_system
  • g3_gsm\/sms_alarm_system
  • a11_pstn\/lcd\/rfid_touch_alarm_system_firmware
  • g5w_3g
  • wifi\/cellular_smart_home_system_h4_plus
  • a8_pstn_alarm_system
  • a11_pstn\/lcd\/rfid_touch_alarm_system
  • wifi_alarm_system
  • g3_gsm\/sms_alarm_system_firmware
  • g5_plus_gsm\/sms\/rfid_touch_alarm_system
CWE
CWE-294

Authentication Bypass by Capture-replay