Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:amag:en-1dbc_firmware:03.60:*:*:*:*:*:*:*", "matchCriteriaId": "46B31B9E-2F5F-4906-B9BD-944AA8C7326C", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:amag:en-1dbc:-:*:*:*:*:*:*:*", "matchCriteriaId": "549C9CA6-CB0A-476C-B8FF-5FA011DDB3CA", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:amag:std_firmware:03.60:*:*:*:*:*:*:*", "matchCriteriaId": "CEDC2299-8EDC-4DDB-9CB3-6B0C0695B834", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:amag:std:-:*:*:*:*:*:*:*", "matchCriteriaId": "38ACC405-3471-408A-ADAB-86AF96664FAD", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:amag:en-2dbc_firmware:03.60:*:*:*:*:*:*:*", "matchCriteriaId": "0BDAF16C-D1E0-4EDA-A7B4-F8D79C17B640", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:amag:en-2dbc:-:*:*:*:*:*:*:*", "matchCriteriaId": "80A5D338-FFFC-41BF-9DD6-D41BB3A451CA", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:amag:std_firmware:01.00:*:*:*:*:*:*:*", "matchCriteriaId": "C4353787-C479-406C-B645-2124922DA7EC", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:amag:std:-:*:*:*:*:*:*:*", "matchCriteriaId": "38ACC405-3471-408A-ADAB-86AF96664FAD", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Incorrect access control in AMAG Symmetry Door Edge Network Controllers (EN-1DBC Boot App 23611 03.60 and STD App 23603 03.60; EN-2DBC Boot App 24451 01.00 and STD App 2461 01.00) enables remote attackers to execute door controller commands (e.g., lock, unlock, add ID card value) by sending unauthenticated requests to the affected devices via Serial over TCP/IP, as demonstrated by a Ud command."}, {"lang": "es", "value": "El control de acceso incorrecto en AMAG Symmetry Door Edge Network Controllers (EN-1DBC Boot App 23611 03.60 y STD App 23603 03.60; EN-2DBC Boot App 24451 01.00 y STD App 2461 01.00) permite que atacantes remotos ejecuten comandos de controlador de puertas (por ejemplo, lock, unlock, add ID card value) mediante el env\u00edo de peticiones no autenticadas a los dispositivos afectados mediante Serial por TCP/IP, tal y como demuestra un comando Ud."}], "id": "CVE-2017-16241", "lastModified": "2025-04-20T01:37:25.860", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0"}, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2017-12-10T01:29:00.190", "references": [{"source": "cve@mitre.org", "tags": ["Exploit"], "url": "https://github.com/lixmk/Concierge"}, {"source": "cve@mitre.org", "tags": ["Not Applicable"], "url": "https://hushcon.com/schedule.html"}, {"source": "cve@mitre.org", "tags": ["Third Party Advisory"], "url": "https://www.secureworks.com/research/advisory-2017-001"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit"], "url": "https://github.com/lixmk/Concierge"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Not Applicable"], "url": "https://hushcon.com/schedule.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://www.secureworks.com/research/advisory-2017-001"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-306"}], "source": "nvd@nist.gov", "type": "Primary"}]}