An issue was discovered on certain Nuki Home Solutions devices. An attacker with physical access to the circuit board could use the SWD debug features to control the execution of code on the processor and debug the firmware, as well as read or alter the content of the internal and external flash memory. This affects Nuki Smart Lock 3.0 before 3.3.5, Nuki Smart Lock 2.0 before 2.12.4, as well as Nuki Bridge v1 before 1.22.0 and v2 before 2.13.2.
Metrics
Affected Vendors & Products
References
History
Fri, 14 Feb 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Nuki
Nuki bridge Nuki bridge Firmware Nuki smart Lock Nuki smart Lock Firmware |
|
CPEs | cpe:2.3:h:nuki:bridge:*:*:*:*:*:*:*:* cpe:2.3:h:nuki:smart_lock:*:*:*:*:*:*:*:* cpe:2.3:o:nuki:bridge_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:nuki:smart_lock_firmware:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Nuki
Nuki bridge Nuki bridge Firmware Nuki smart Lock Nuki smart Lock Firmware |
|
Metrics |
ssvc
|
Tue, 20 Aug 2024 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-1263 | |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-02-13T15:46:25.989Z
Reserved: 2022-06-06T00:00:00.000Z
Link: CVE-2022-32506

Updated: 2024-08-03T07:46:43.279Z

Status : Awaiting Analysis
Published: 2024-05-14T10:43:41.587
Modified: 2024-11-21T07:06:30.463
Link: CVE-2022-32506

No data.