binary allows malicious actors to create credentials for any site code and card number that is using the default
ICT encryption.
Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
* Use custom keysets unique to customer sites to prevent cards being created by third parties using exploited publicly available default keysets * Setup two-factor authentication (2FA) on all doors where PIN readers are installed to mitigate the risk of using credentials with publicly available default keysets
| Link | Providers |
|---|---|
| https://ict.co/media/1xdhaugi/credential-cloning.pdf |
|
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: ICT
Published:
Updated: 2024-08-02T01:17:58.493Z
Reserved: 2024-03-21T20:07:00.532Z
Link: CVE-2024-29941
Updated: 2024-08-02T01:17:58.493Z
Status : Awaiting Analysis
Published: 2024-05-06T23:15:06.527
Modified: 2024-11-21T09:08:39.710
Link: CVE-2024-29941
No data.
OpenCVE Enrichment
No data.