Vulnerability Note VU#767044
Hanvon facial recognition (Face ID) devices do not authenticate commands
Hanvon facial recognition (Face ID) devices possibly running software versions prior to 1.007.110 could allow an unauthenticated attacker to modify user and access control information.
It has been reported that Hanvon biometric facial recognition devices running software versions prior to 1.007.110 do not authenticate network connections or API commands. Hanvon devices provide a plain-text management protocol/API on port 9922/tcp. An attacker with network access can connect to devices using telnet or a similar terminal or TCP socket utility, with no authentication.
An unauthenticated attacker with network access to vulnerable devices on 9922/tcp could create, modify, and delete user and access control information. This could allow the attacker to bypass authentication and authorization for physical access or time and attendance tracking.
Vendor Information (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Hanvon Technology Co||Affected||-||07 May 2014|
CVSS Metrics (Learn More)
Thanks to Kelvin Tan Thiam Teck for reporting this vulnerability.
This document was written by Michael Orlando.
- CVE IDs: CVE-2014-2938
- Date Public: 20 May 2014
- Date First Published: 20 May 2014
- Date Last Updated: 20 May 2014
- Document Revision: 16
If you have feedback, comments, or additional information about this vulnerability, please send us email.