CVE-2023-7003: CWE-323 Reusing a Nonce, Key Pair in Encryption in Sciener Kontrol Lux
The AES key utilized in the pairing process between a lock using Sciener firmware and a wireless keypad is not unique, and can be reused to compromise other locks using the Sciener firmware.
AI Analysis
Technical Summary
CVE-2023-7003 identifies a cryptographic vulnerability in the Sciener Kontrol Lux smart lock system, specifically in firmware version 6.5.x. The issue stems from the reuse of an AES key and nonce pair during the pairing process between the lock and its wireless keypad. In cryptographic systems, nonces and keys must be unique per session or device to ensure secure encryption; reusing them can lead to key recovery or replay attacks. This vulnerability is classified under CWE-323 (Reusing a Nonce, Key Pair in Encryption), indicating a fundamental flaw in the implementation of cryptographic protocols. Because the same AES key is reused across multiple locks, an attacker who can capture or deduce the key from one device can potentially decrypt communications or impersonate the keypad to unlock other devices using the same firmware. The CVSS 3.1 score of 6.8 reflects a medium severity, with attack vector being physical (AV:P), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The vulnerability does not require authentication or user interaction but does require proximity or physical access to the wireless communication channel. No patches or fixes have been published yet, and no exploits are known to be active in the wild. This vulnerability undermines the fundamental security guarantees of the lock system, potentially allowing unauthorized access to physical premises secured by these devices.
Potential Impact
For European organizations, this vulnerability poses a significant risk to physical security, especially in environments relying on Sciener Kontrol Lux locks for access control, such as offices, residential buildings, and critical infrastructure facilities. Unauthorized unlocking could lead to theft, espionage, or sabotage. The compromise of lock integrity also undermines trust in smart building automation systems, potentially causing operational disruptions. Confidentiality is impacted as attackers could intercept or manipulate encrypted communications between the lock and keypad. Integrity and availability are at risk because attackers could unlock doors without authorization or disrupt normal lock operations. The medium CVSS score indicates a moderate but actionable threat. Given the lack of patches, organizations must assume the vulnerability could be exploited if attackers gain physical proximity or wireless access. The impact is heightened in sectors with high security requirements, such as government buildings, financial institutions, and healthcare facilities. Additionally, the vulnerability may affect supply chain security if these locks are used in managed properties or multi-tenant environments.
Mitigation Recommendations
1. Immediately inventory all Sciener Kontrol Lux devices running firmware version 6.5.x within the organization to identify affected units. 2. Restrict physical and wireless access to the vicinity of these locks to prevent attackers from capturing pairing communications or attempting to exploit the reused key. 3. Monitor official Sciener communications and firmware update channels closely for patches addressing CVE-2023-7003 and apply updates promptly once available. 4. Consider deploying additional physical security controls such as secondary locks or alarms to mitigate risk until a firmware fix is released. 5. For high-security environments, evaluate replacing affected locks with alternative products that follow robust cryptographic standards and do not reuse keys or nonces. 6. Conduct security awareness training for facility management personnel to recognize and report suspicious activity near smart locks. 7. Implement network segmentation and monitoring for any connected smart lock management systems to detect anomalous access attempts. 8. Engage with vendors and security researchers to stay informed about potential exploit developments and mitigation strategies.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Italy, Spain
CVE-2023-7003: CWE-323 Reusing a Nonce, Key Pair in Encryption in Sciener Kontrol Lux
Description
The AES key utilized in the pairing process between a lock using Sciener firmware and a wireless keypad is not unique, and can be reused to compromise other locks using the Sciener firmware.
AI-Powered Analysis
Technical Analysis
CVE-2023-7003 identifies a cryptographic vulnerability in the Sciener Kontrol Lux smart lock system, specifically in firmware version 6.5.x. The issue stems from the reuse of an AES key and nonce pair during the pairing process between the lock and its wireless keypad. In cryptographic systems, nonces and keys must be unique per session or device to ensure secure encryption; reusing them can lead to key recovery or replay attacks. This vulnerability is classified under CWE-323 (Reusing a Nonce, Key Pair in Encryption), indicating a fundamental flaw in the implementation of cryptographic protocols. Because the same AES key is reused across multiple locks, an attacker who can capture or deduce the key from one device can potentially decrypt communications or impersonate the keypad to unlock other devices using the same firmware. The CVSS 3.1 score of 6.8 reflects a medium severity, with attack vector being physical (AV:P), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The vulnerability does not require authentication or user interaction but does require proximity or physical access to the wireless communication channel. No patches or fixes have been published yet, and no exploits are known to be active in the wild. This vulnerability undermines the fundamental security guarantees of the lock system, potentially allowing unauthorized access to physical premises secured by these devices.
Potential Impact
For European organizations, this vulnerability poses a significant risk to physical security, especially in environments relying on Sciener Kontrol Lux locks for access control, such as offices, residential buildings, and critical infrastructure facilities. Unauthorized unlocking could lead to theft, espionage, or sabotage. The compromise of lock integrity also undermines trust in smart building automation systems, potentially causing operational disruptions. Confidentiality is impacted as attackers could intercept or manipulate encrypted communications between the lock and keypad. Integrity and availability are at risk because attackers could unlock doors without authorization or disrupt normal lock operations. The medium CVSS score indicates a moderate but actionable threat. Given the lack of patches, organizations must assume the vulnerability could be exploited if attackers gain physical proximity or wireless access. The impact is heightened in sectors with high security requirements, such as government buildings, financial institutions, and healthcare facilities. Additionally, the vulnerability may affect supply chain security if these locks are used in managed properties or multi-tenant environments.
Mitigation Recommendations
1. Immediately inventory all Sciener Kontrol Lux devices running firmware version 6.5.x within the organization to identify affected units. 2. Restrict physical and wireless access to the vicinity of these locks to prevent attackers from capturing pairing communications or attempting to exploit the reused key. 3. Monitor official Sciener communications and firmware update channels closely for patches addressing CVE-2023-7003 and apply updates promptly once available. 4. Consider deploying additional physical security controls such as secondary locks or alarms to mitigate risk until a firmware fix is released. 5. For high-security environments, evaluate replacing affected locks with alternative products that follow robust cryptographic standards and do not reuse keys or nonces. 6. Conduct security awareness training for facility management personnel to recognize and report suspicious activity near smart locks. 7. Implement network segmentation and monitoring for any connected smart lock management systems to detect anomalous access attempts. 8. Engage with vendors and security researchers to stay informed about potential exploit developments and mitigation strategies.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- certcc
- Date Reserved
- 2023-12-20T14:56:09.534Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690a47466d939959c80222d9
Added to database: 11/4/2025, 6:34:46 PM
Last enriched: 11/4/2025, 7:30:34 PM
Last updated: 12/20/2025, 4:13:12 PM
Views: 37
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-7782: CWE-862 Missing Authorization in WP JobHunt
HighCVE-2025-7733: CWE-639 Authorization Bypass Through User-Controlled Key in WP JobHunt
MediumCVE-2025-14298: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in damian-gora FiboSearch – Ajax Search for WooCommerce
MediumCVE-2025-12492: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in ultimatemember Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin
MediumCVE-2025-13619: CWE-269 Improper Privilege Management in CMSSuperHeroes Flex Store Users
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.