Permalink
CVE-2025-15114
9.8 CRITICAL
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): HIGH
Ksenia Security Lares 4.0 Home Automation 1.6 PIN Exposure Vulnerability
Ksenia Security Lares 4.0 Home Automation version 1.6 contains a critical security flaw that exposes the alarm system PIN in the 'basisInfo' XML file after authentication. Attackers can retrieve the PIN from the server response to bypass security measures and disable the alarm system without additional authentication.
References
-
Zero Science Lab Disclosure (ZSL-2025-5929) third-party-advisory
-
Zero Science Lab Disclosure (ZSL-2025-5929) third-party-advisory
-
Affected products
lares
- ==1.0.0.15
- ==1.6
Ksenia Security Lares 4.0 Home Automation
- ==1.0.0.15
- ==1.6
Matching in nixpkgs
pkgs.flaresolverr
Proxy server to bypass Cloudflare protection
pkgs.tests.arrayUtilities.isDeclaredMap.previousScopeDeclareSingletonMapFails
A wrapper around testers.testBuildFailure to simplify common use cases
pkgs.tests.arrayUtilities.isDeclaredArray.previousScopeDeclareSingletonArrayFails
A wrapper around testers.testBuildFailure to simplify common use cases
Package maintainers
-
@paveloom Pavel Sobolev <contact@paveloom.dev>
-
@ConnorBaker Connor Baker <ConnorBaker01@gmail.com>