First published: Tue May 23 2023(Updated: )
Weak security in the transmitter of Blitzwolf BW-IS22 Smart Home Security Alarm v1.0 allows attackers to gain full access to the system via a code replay attack.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Blitzwolf BW-IS22 | =1.0 | |
Blitzwolf BW-IS22 Firmware | ||
Blitzwolf BW-IS22 | =1.0 | |
Blitzwolf BW-IS22 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-31761 is classified as a high-severity vulnerability due to its potential to allow unauthorized access to the smart home security system.
To mitigate CVE-2023-31761, users should update the Blitzwolf BW-IS22 firmware to the latest version if available or implement network security measures to limit exposure.
CVE-2023-31761 affects the Blitzwolf BW-IS22 Smart Home Security Alarm running firmware version 1.0.
CVE-2023-31761 involves a code replay attack that can be exploited to gain full access to the system's functionality.
Yes, CVE-2023-31761 can be exploited remotely, making it crucial for users to secure their network.