Filtered by vendor Anviz Subscriptions
Total 9 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2019-12518 1 Anviz 1 Crosschex 2024-11-21 9.8 Critical
Anviz CrossChex access control management software 4.3.8.0 and 4.3.12 is vulnerable to a buffer overflow vulnerability.
CVE-2019-12394 1 Anviz 1 Management System 2024-11-21 9.8 Critical
Anviz access control devices allow unverified password change which allows remote attackers to change the administrator password without prior authentication.
CVE-2019-12393 1 Anviz 1 Management System 2024-11-21 7.5 High
Anviz access control devices are vulnerable to replay attacks which could allow attackers to intercept and replay open door requests.
CVE-2019-12392 1 Anviz 1 Anviz Firmware 2024-11-21 9.8 Critical
Anviz access control devices allow remote attackers to issue commands without a password.
CVE-2019-12391 1 Anviz 1 Management System 2024-11-21 7.5 High
The Anviz Management System for access control has insufficient logging for device events such as door open requests.
CVE-2019-12390 1 Anviz 1 Anviz Firmware 2024-11-21 5.3 Medium
Anviz access control devices expose private Information (pin code and name) by allowing remote attackers to query this information without credentials via port tcp/5010.
CVE-2019-12389 1 Anviz 1 Anviz Firmware 2024-11-21 7.5 High
Anviz access control devices expose credentials (names and passwords) by allowing remote attackers to query this information without credentials via port tcp/5010.
CVE-2019-12388 1 Anviz 1 Anviz Firmware 2024-11-21 7.5 High
Anviz access control devices perform cleartext transmission of sensitive information (passwords/pins and names) when replying to query on port tcp/5010.
CVE-2019-11523 1 Anviz 2 M3, M3 Firmware 2024-11-21 N/A
Anviz Global M3 Outdoor RFID Access Control executes any command received from any source. No authentication/encryption is done. Attackers can fully interact with the device: for example, send the "open door" command, download the users list (which includes RFID codes and passcodes in cleartext), or update/create users. The same attack can be executed on a local network and over the internet (if the device is exposed on a public IP address).