Learn about CVE-2020-8791 affecting the OKLOK mobile companion app. Remote attackers can exploit this vulnerability to access sensitive user data. Find mitigation steps here.
The OKLOK (3.1.1) mobile companion app for Fingerprint Bluetooth Padlock FB50 (2.3) allows remote attackers to submit API requests using authenticated but unauthorized tokens, resulting in IDOR issues. Attackers can make unauthorized API requests on behalf of arbitrary user IDs, potentially accessing sensitive information.
Understanding CVE-2020-8791
This CVE involves a vulnerability in the OKLOK mobile companion app that can be exploited by remote attackers.
What is CVE-2020-8791?
The vulnerability in the OKLOK app allows attackers to use unauthorized tokens to submit API requests, leading to Insecure Direct Object Reference (IDOR) issues. This enables attackers to access sensitive user data.
The Impact of CVE-2020-8791
The exploitation of this vulnerability can result in the unauthorized retrieval of email addresses, unsalted MD5 password hashes, owner-assigned lock names, and fingerprint names for arbitrary user IDs.
Technical Details of CVE-2020-8791
This section provides more technical insights into the CVE.
Vulnerability Description
The vulnerability in the OKLOK app allows remote attackers to exploit IDOR issues by using unauthorized tokens to make API requests on behalf of arbitrary user IDs.
Affected Systems and Versions
Exploitation Mechanism
Attackers can leverage the vulnerability to guess valid and current user IDs due to the app's user ID assignment convention, enabling unauthorized API requests.
Mitigation and Prevention
Protecting against CVE-2020-8791 requires immediate actions and long-term security practices.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates