CVE-2023-50123

8.1 HIGH

📋 TL;DR

CVE-2023-50123 allows attackers to brute force SMS authentication on the Hozard Alarm system v1.0 due to unlimited disarming attempts. This could let attackers disarm alarm systems remotely. Affects users of Hozard Alarm system v1.0.

💻 Affected Systems

Products:
  • Hozard Alarm system (alarmsystemen)
Versions: v1.0
Operating Systems: Embedded/IoT
Default Config Vulnerable: ⚠️ Yes
Notes: Requires SMS connectivity; vulnerability exists in authentication mechanism.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker successfully disarms alarm system, enabling physical intrusion without triggering alarms or notifications.

🟠

Likely Case

Attacker disarms alarm system after multiple SMS attempts, potentially allowing unauthorized access.

🟢

If Mitigated

Failed authentication attempts are logged and limited, preventing successful brute force attacks.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires SMS access to target system; brute force tools can automate attempts.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices

Restart Required: No

Instructions:

No official patch available. Contact vendor for firmware updates or mitigation guidance.

🔧 Temporary Workarounds

Implement SMS rate limiting

all

Configure SMS gateway or alarm system to limit authentication attempts per time period.

Disable SMS authentication

all

Switch to alternative authentication methods if available.

🧯 If You Can't Patch

  • Monitor SMS logs for repeated authentication attempts and alert on anomalies.
  • Implement network segmentation to restrict SMS gateway access to trusted sources only.

🔍 How to Verify

Check if Vulnerable:

Test if system allows unlimited SMS authentication attempts for disarming.

Check Version:

Check device firmware version via admin interface or documentation.

Verify Fix Applied:

Verify that SMS authentication attempts are now limited (e.g., lockout after 5 failed attempts).

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed SMS authentication attempts from same source in short timeframe.

Network Indicators:

  • Unusual SMS traffic patterns to alarm system numbers.

SIEM Query:

sms_authentication_failure_count > 5 WITHIN 5 minutes

🔗 References

📤 Share & Export