The remote keyless system of the Hozard alarm system (alarmsystemen) v1.0 sends an identical radio frequency signal for each request, which results in an attacker being able to conduct replay attacks to bring the alarm system to a disarmed state.
                
            References
                    | Link | Resource | 
|---|---|
| http://hozard.com | Product | 
| https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices | Third Party Advisory | 
| http://hozard.com | Product | 
| https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices | Third Party Advisory | 
Configurations
                    History
                    21 Nov 2024, 08:36
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://hozard.com - Product | |
| References | () https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices - Third Party Advisory | 
19 Jan 2024, 15:29
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-01-11 21:15
Updated : 2025-06-20 17:15
NVD link : CVE-2023-50128
Mitre link : CVE-2023-50128
CVE.ORG link : CVE-2023-50128
JSON object : View
Products Affected
                hozard
- alarm_system
 
CWE
                
                    
                        
                        CWE-294
                        
            Authentication Bypass by Capture-replay
