The management console of iDoors Reader vulnerable to authentication bypass


The management console of iDoors Reader provided by A.T.WORKS, Inc. contains an authentication bypass vulnerability (CWE-288).

Yusuke Nakano of Secure Cycle Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVSS Severity (What is CVSS?)

CVSS V3 Severity:
Base Metrics 8.8 (High) [IPA Score]
  • Attack Vector: Adjacent Network
  • Attack Complexity: Low
  • Privileges Required: None
  • User Interaction: None
  • Scope: Unchanged
  • Confidentiality Impact: High
  • Integrity Impact: High
  • Availability Impact: High
CVSS V2 Severity:
Base Metrics 5.8 (Medium) [IPA Score]
  • Access Vector: Adjacent Network
  • Access Complexity: Low
  • Authentication: None
  • Confidentiality Impact: Partial
  • Integrity Impact: Partial
  • Availability Impact: Partial
Affected Products

  • iDoors Reader 2.10.17 and earlier

According to the developer, the management console of iDoors Cloud is not affected by this vulnerability.

An attacker in the same segment may access the management console and operate the product.

[Update the Firmware]
Apply the firmware update according to the information provided by the developer.
Vendor Information

CWE (What is CWE?)

  1. Permissions(CWE-264) [IPA Evaluation]
CVE (What is CVE?)

  1. CVE-2019-5964

  1. JVN : JVN#28218613
  2. National Vulnerability Database (NVD) : CVE-2019-5964
Revision History

  • [2019/07/01]
      Web page was published
  • [2019/10/04]
      References : Content was added