On IROAD X5 devices, a Bypass of Device Pairing can occur...
Moderate severity
Unreviewed
Published
Mar 18, 2025
to the GitHub Advisory Database
•
Updated Mar 21, 2025
Description
Published by the National Vulnerability Database
Mar 18, 2025
Published to the GitHub Advisory Database
Mar 18, 2025
Last updated
Mar 21, 2025
On IROAD X5 devices, a Bypass of Device Pairing can occur via MAC Address Spoofing. The dashcam's pairing mechanism relies solely on MAC address verification, allowing an attacker to bypass authentication by spoofing an already-paired MAC address that can be captured via an ARP scan.
References