Authentication bypass in F25 Series - CVE-2018-17935
Published: October 23, 2018 / Updated: October 24, 2018
F25 Series
Detailed vulnerability description
The vulnerability allows an adjacent attacker to bypass authentication on the target system.
The vulnerability exists due to use of fixed codes that are reproducible by sniffing and re-transmission. A remote unauthenticated attacker can bypass authentication to replay commands, spoof arbitrary message, or keep the controlled load in a permanent “stop” state.