Missing encryption in the NFC tags of the Flient Smart Door Lock v1.0 allows attackers to create a cloned tag via brief physical proximity to the original tags, which results in an attacker gaining access to the perimeter.
References
| Link | Resource |
|---|---|
| https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices | Exploit Third Party Advisory |
| https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
21 Nov 2024, 08:36
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devicesĀ - Exploit, Third Party Advisory |
19 Jan 2024, 14:08
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-01-11 21:15
Updated : 2025-06-20 17:15
NVD link : CVE-2023-50129
Mitre link : CVE-2023-50129
CVE.ORG link : CVE-2023-50129
JSON object : View
Products Affected
flient
- smart_lock_advanced
- smart_lock_advanced_firmware
CWE
CWE-311
Missing Encryption of Sensitive Data
