CVE-2020-10876

7.5 HIGH

📋 TL;DR

The OKLOK mobile app for Fingerprint Bluetooth Padlock FB50 has insufficient security controls for password reset verification codes. Attackers can brute-force the 4-digit code to bypass email verification and hijack user accounts. This affects users of OKLOK app version 3.1.1 with FB50 padlock version 2.3.

💻 Affected Systems

Products:
  • OKLOK mobile companion app
  • Fingerprint Bluetooth Padlock FB50
Versions: OKLOK app 3.1.1, FB50 padlock firmware 2.3
Operating Systems: iOS, Android
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default configuration of the mobile app when paired with affected padlock firmware.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete account takeover allowing attacker to lock legitimate users out of their padlock accounts and potentially access personal information.

🟠

Likely Case

Unauthorized password changes leading to denial of service for legitimate padlock owners.

🟢

If Mitigated

Minimal impact with proper rate limiting and timeout mechanisms in place.

🌐 Internet-Facing: HIGH - Mobile app communicates with backend services over internet, making attacks remotely feasible.
🏢 Internal Only: LOW - This is primarily an internet-facing mobile application vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple brute-force attack against 4-digit code with no rate limiting. Public GitHub repository demonstrates exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: No vendor advisory found

Restart Required: No

Instructions:

1. Check app store for updated OKLOK app version
2. Update to latest version if available
3. Check for padlock firmware updates through the app

🔧 Temporary Workarounds

Disable password reset functionality

all

Temporarily disable password reset feature in app settings if available

Enable two-factor authentication

all

If app supports additional authentication factors, enable them

🧯 If You Can't Patch

  • Monitor account activity for unauthorized password reset attempts
  • Consider discontinuing use of vulnerable app version until patch is available

🔍 How to Verify

Check if Vulnerable:

Check app version in settings: if OKLOK version is 3.1.1 and paired with FB50 padlock version 2.3, system is vulnerable.

Check Version:

Check app version in mobile device settings under 'Apps' or 'Application Manager'

Verify Fix Applied:

Verify app has been updated to version newer than 3.1.1 and padlock firmware is newer than 2.3.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed verification attempts from single IP
  • Rapid succession of password reset requests

Network Indicators:

  • Unusual patterns of authentication API calls
  • High volume of requests to verification endpoints

SIEM Query:

source="oklok_app" AND (event="verification_failed" count>10 within 1min) OR (event="password_reset" count>5 within 5min)

🔗 References

📤 Share & Export