An attacker with physical access to a BrilliantTS FUZE card (MCU firmware 0.1.73, BLE firmware 0.7.4) can unlock the card, extract credit card numbers, and tamper with data on the card via Bluetooth because no authentication is needed, as demonstrated by gatttool.
References
Link | Resource |
---|---|
https://blog.ice9.us/2018/04/stealing-credit-cards-from-fuze-bluetooth.html | Third Party Advisory |
https://ice9.us/advisories/ICE9-2018-001.txt | Third Party Advisory |
https://www.elttam.com/blog/fuzereview/#content | |
https://www.reddit.com/r/netsec/comments/89qrp1/stealing_credit_cards_from_fuze_via_bluetooth/ | Issue Tracking |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2018-04-04 18:29
Updated : 2023-08-31 23:15
NVD link : CVE-2018-9119
Mitre link : CVE-2018-9119
CVE.ORG link : CVE-2018-9119
JSON object : View
Products Affected
brilliantts
- fuze_card_mcu_firmware
- fuze_card_ble_firmware
- fuze_card
CWE
CWE-306
Missing Authentication for Critical Function