CVE-2024-22388

Certain configuration available in the communication channel for encoders could expose sensitive data when reader configuration cards are programmed. This data could include credential and device administration keys.
References
Link Resource
https://support.hidglobal.com/ Product
https://www.cisa.gov/news-events/ics-advisories/icsa-24-037-01 Third Party Advisory US Government Resource
https://support.hidglobal.com/ Product
https://www.cisa.gov/news-events/ics-advisories/icsa-24-037-01 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:hidglobal:iclass_se_cp1000_encoder_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:hidglobal:iclass_se_cp1000_encoder:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:hidglobal:iclass_se_readers_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:hidglobal:iclass_se_readers:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:hidglobal:iclass_se_reader_modules_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:hidglobal:iclass_se_reader_modules:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:hidglobal:iclass_se_processors_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:hidglobal:iclass_se_processors:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:hidglobal:omnikey_5427ck_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:hidglobal:omnikey_5427ck:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:hidglobal:omnikey_5127ck_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:hidglobal:omnikey_5127ck:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:hidglobal:omnikey_5023_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:hidglobal:omnikey_5023:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:hidglobal:omnikey_5027_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:hidglobal:omnikey_5027:-:*:*:*:*:*:*:*

History

21 Nov 2024, 08:56

Type Values Removed Values Added
References () https://support.hidglobal.com/ - Product () https://support.hidglobal.com/ - Product
References () https://www.cisa.gov/news-events/ics-advisories/icsa-24-037-01 - Third Party Advisory, US Government Resource () https://www.cisa.gov/news-events/ics-advisories/icsa-24-037-01 - Third Party Advisory, US Government Resource
CVSS v2 : unknown
v3 : 7.8
v2 : unknown
v3 : 5.9

17 Oct 2024, 19:15

Type Values Removed Values Added
Summary (en) Certain configuration available in the communication channel for encoders could expose sensitive data when reader configuration cards are programmed. This data could include credential and device administration keys. (en) Certain configuration available in the communication channel for encoders could expose sensitive data when reader configuration cards are programmed. This data could include credential and device administration keys.
CWE CWE-285 CWE-1188

14 Feb 2024, 20:59

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 5.9
v2 : unknown
v3 : 7.8
References () https://support.hidglobal.com/ - () https://support.hidglobal.com/ - Product
References () https://www.cisa.gov/news-events/ics-advisories/icsa-24-037-01 - () https://www.cisa.gov/news-events/ics-advisories/icsa-24-037-01 - Third Party Advisory, US Government Resource
CWE NVD-CWE-Other
First Time Hidglobal iclass Se Processors
Hidglobal omnikey 5427ck Firmware
Hidglobal omnikey 5027
Hidglobal iclass Se Readers Firmware
Hidglobal omnikey 5127ck Firmware
Hidglobal iclass Se Reader Modules
Hidglobal omnikey 5427ck
Hidglobal omnikey 5023
Hidglobal omnikey 5127ck
Hidglobal iclass Se Reader Modules Firmware
Hidglobal
Hidglobal omnikey 5023 Firmware
Hidglobal iclass Se Cp1000 Encoder Firmware
Hidglobal omnikey 5027 Firmware
Hidglobal iclass Se Readers
Hidglobal iclass Se Processors Firmware
Hidglobal iclass Se Cp1000 Encoder
CPE cpe:2.3:o:hidglobal:omnikey_5127ck_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:hidglobal:iclass_se_readers:-:*:*:*:*:*:*:*
cpe:2.3:o:hidglobal:iclass_se_readers_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:hidglobal:omnikey_5027:-:*:*:*:*:*:*:*
cpe:2.3:h:hidglobal:iclass_se_processors:-:*:*:*:*:*:*:*
cpe:2.3:h:hidglobal:iclass_se_reader_modules:-:*:*:*:*:*:*:*
cpe:2.3:o:hidglobal:omnikey_5023_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:hidglobal:omnikey_5023:-:*:*:*:*:*:*:*
cpe:2.3:o:hidglobal:iclass_se_reader_modules_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:hidglobal:iclass_se_processors_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:hidglobal:omnikey_5427ck:-:*:*:*:*:*:*:*
cpe:2.3:o:hidglobal:iclass_se_cp1000_encoder_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:hidglobal:iclass_se_cp1000_encoder:-:*:*:*:*:*:*:*
cpe:2.3:o:hidglobal:omnikey_5027_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:hidglobal:omnikey_5427ck_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:hidglobal:omnikey_5127ck:-:*:*:*:*:*:*:*

07 Feb 2024, 01:11

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-06 23:15

Updated : 2024-11-21 08:56


NVD link : CVE-2024-22388

Mitre link : CVE-2024-22388

CVE.ORG link : CVE-2024-22388


JSON object : View

Products Affected

hidglobal

  • iclass_se_readers_firmware
  • omnikey_5127ck_firmware
  • iclass_se_processors
  • omnikey_5027_firmware
  • iclass_se_cp1000_encoder_firmware
  • omnikey_5023_firmware
  • iclass_se_processors_firmware
  • iclass_se_reader_modules
  • omnikey_5427ck
  • omnikey_5027
  • iclass_se_reader_modules_firmware
  • iclass_se_readers
  • omnikey_5023
  • iclass_se_cp1000_encoder
  • omnikey_5427ck_firmware
  • omnikey_5127ck
CWE
CWE-1188

Initialization of a Resource with an Insecure Default

NVD-CWE-Other