assaabloy CVE Vulnerabilities & Metrics

Focus on assaabloy vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About assaabloy Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with assaabloy. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total assaabloy CVEs: 14
Earliest CVE date: 15 Jul 2019, 14:15 UTC
Latest CVE date: 05 Dec 2023, 00:15 UTC

Latest CVE reference: CVE-2023-26943

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 0

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -100.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -100.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical assaabloy CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 2.42

Max CVSS: 10.0

Critical CVEs (≥9): 1

CVSS Range vs. Count

Range Count
0.0-3.9 9
4.0-6.9 4
7.0-8.9 0
9.0-10.0 1

CVSS Distribution Chart

Top 5 Highest CVSS assaabloy CVEs

These are the five CVEs with the highest CVSS scores for assaabloy, sorted by severity first and recency.

All CVEs for assaabloy

CVE-2023-26943 assaabloy vulnerability CVSS: 0 05 Dec 2023, 00:15 UTC

Weak encryption mechanisms in RFID Tags in Yale Keyless Lock v1.0 allows attackers to create a cloned tag via physical proximity to the original.

CVE-2023-26942 assaabloy vulnerability CVSS: 0 05 Dec 2023, 00:15 UTC

Weak encryption mechanisms in RFID Tags in Yale IA-210 Alarm v1.0 allows attackers to create a cloned tag via physical proximity to the original.

CVE-2023-26941 assaabloy vulnerability CVSS: 0 05 Dec 2023, 00:15 UTC

Weak encryption mechanisms in RFID Tags in Yale Conexis L1 v1.1.0 allows attackers to create a cloned tag via physical proximity to the original.

CVE-2023-4392 assaabloy vulnerability CVSS: 2.6 17 Aug 2023, 03:15 UTC

A vulnerability was found in Control iD Gerencia Web 1.30 and classified as problematic. Affected by this issue is some unknown functionality of the component Cookie Handler. The manipulation leads to cleartext storage of sensitive information. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-237380. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE-2023-33367 assaabloy vulnerability CVSS: 0 05 Aug 2023, 02:15 UTC

A SQL injection vulnerability exists in Control ID IDSecure 4.7.26.0 and prior, allowing unauthenticated attackers to write PHP files on the server's root directory, resulting in remote code execution.

CVE-2023-33371 assaabloy vulnerability CVSS: 0 03 Aug 2023, 01:15 UTC

Control ID IDSecure 4.7.26.0 and prior uses a hardcoded cryptographic key in order to sign and verify JWT session tokens, allowing attackers to sign arbitrary session tokens and bypass authentication.

CVE-2023-33370 assaabloy vulnerability CVSS: 0 03 Aug 2023, 01:15 UTC

An uncaught exception vulnerability exists in Control ID IDSecure 4.7.26.0 and prior, allowing attackers to cause the main web server of IDSecure to fault and crash, causing a denial of service.

CVE-2023-33369 assaabloy vulnerability CVSS: 0 03 Aug 2023, 01:15 UTC

A path traversal vulnerability exists in Control ID IDSecure 4.7.26.0 and prior, allowing attackers to delete arbitrary files on IDSecure filesystem, causing a denial of service.

CVE-2023-33368 assaabloy vulnerability CVSS: 0 03 Aug 2023, 01:15 UTC

Some API routes exists in Control ID IDSecure 4.7.26.0 and prior, exfiltrating sensitive information and passwords to users accessing these API routes.

CVE-2023-2044 assaabloy vulnerability CVSS: 4.0 14 Apr 2023, 10:15 UTC

A vulnerability has been found in Control iD iDSecure 4.7.29.1 and classified as problematic. This vulnerability affects unknown code of the component Dispositivos Page. The manipulation of the argument IP-DNS leads to cross site scripting. The attack can be initiated remotely. VDB-225922 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE-2023-2043 assaabloy vulnerability CVSS: 6.5 14 Apr 2023, 10:15 UTC

A vulnerability, which was classified as problematic, was found in Control iD RHiD 23.3.19.0. This affects an unknown part of the file /v2/customerdb/operator.svc/a of the component Edit Handler. The manipulation of the argument email leads to sql injection. It is possible to initiate the attack remotely. The identifier VDB-225921 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE-2020-23826 assaabloy vulnerability CVSS: 6.5 26 Jan 2021, 18:15 UTC

The Yale WIPC-303W 2.21 through 2.31 camera is vulnerable to remote command execution (RCE) through command injection via the HTTP API. NOTE: This may be a duplicate of CVE-2020-10176

CVE-2020-10176 assaabloy vulnerability CVSS: 10.0 07 May 2020, 21:15 UTC

ASSA ABLOY Yale WIPC-301W 2.x.2.29 through 2.x.2.43_p1 devices allow Eval Injection of commands.

CVE-2019-13604 assaabloy vulnerability CVSS: 4.3 15 Jul 2019, 14:15 UTC

There is a short key vulnerability in HID Global DigitalPersona (formerly Crossmatch) U.are.U 4500 Fingerprint Reader v24. The key for obfuscating the fingerprint image is vulnerable to brute-force attacks. This allows an attacker to recover the key and decrypt that image using the key. Successful exploitation causes a sensitive biometric information leak.