Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4583: Authentication Bypass by Capture-replay in Shenzhen HCC Technology MPOS M6 PLUS

0
Low
VulnerabilityCVE-2026-4583cvecve-2026-4583
Published: Mon Mar 23 2026 (03/23/2026, 10:31:32 UTC)
Source: CVE Database V5
Vendor/Project: Shenzhen HCC Technology
Product: MPOS M6 PLUS

Description

A vulnerability was detected in Shenzhen HCC Technology MPOS M6 PLUS 1V.31-N. Affected by this issue is some unknown functionality of the component Bluetooth Handler. Performing a manipulation results in authentication bypass by capture-replay. The attack must originate from the local network. The attack is considered to have high complexity. The exploitation is known to be difficult. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/30/2026, 20:22:44 UTC

Technical Analysis

CVE-2026-4583 identifies a vulnerability in the Bluetooth Handler component of Shenzhen HCC Technology's MPOS M6 PLUS device, specifically version 1V.31-N. The vulnerability arises from improper handling of Bluetooth authentication, allowing an attacker to perform a capture-replay attack to bypass authentication mechanisms. This means that an attacker who can capture legitimate Bluetooth authentication traffic on the local network can replay it to gain unauthorized access to the device. The attack requires local network access, implying that remote exploitation over the internet is not feasible. The complexity of the attack is high, indicating that it requires advanced skills and specific conditions to succeed. The vulnerability affects confidentiality, integrity, and availability to a limited extent, as unauthorized access could lead to manipulation or data leakage from the device. The vendor was notified early but did not provide a patch or response, leaving the vulnerability unmitigated at the source. The CVSS 4.0 vector (AV:A/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P) reflects a low base score of 2.3, highlighting the limited scope and impact. No known exploits have been reported in the wild, reducing immediate risk but not eliminating potential future threats. The vulnerability specifically targets Bluetooth communication, a critical interface for MPOS devices, which handle sensitive payment data and transaction authentication.

Potential Impact

The primary impact of CVE-2026-4583 is unauthorized access to the Shenzhen HCC Technology MPOS M6 PLUS device via Bluetooth, potentially allowing attackers to bypass authentication controls. This could lead to unauthorized transaction manipulation, data leakage, or disruption of payment services. However, the requirement for local network access and the high complexity of exploitation limit the scale and immediacy of the threat. Organizations using these MPOS devices in environments with unsecured or poorly segmented local networks face increased risk. Financial institutions, retail businesses, and payment processors relying on these devices could experience operational disruptions or financial fraud if exploited. The lack of vendor response and patch availability prolongs exposure. While no active exploits are known, the vulnerability could be leveraged in targeted attacks, especially in high-value environments where attackers have physical or network proximity. Overall, the impact is low but non-negligible, warranting attention in security assessments and network controls.

Mitigation Recommendations

Given the absence of a vendor patch, organizations should implement compensating controls to mitigate CVE-2026-4583. First, enforce strict network segmentation to isolate MPOS devices from general local network traffic, minimizing attacker access to Bluetooth communications. Use Bluetooth monitoring tools to detect unusual pairing or replay attempts. Disable Bluetooth on MPOS devices when not in use or during off-hours. Employ strong physical security controls to prevent unauthorized local network access. Regularly audit and monitor device logs for signs of suspicious activity. Consider deploying intrusion detection systems capable of identifying Bluetooth replay attacks. Engage with Shenzhen HCC Technology for updates or firmware patches and plan for device replacement if a fix is not forthcoming. Additionally, educate staff on the risks of local network attacks and enforce policies restricting unauthorized device connections. These targeted measures go beyond generic advice by focusing on Bluetooth-specific and local network threat vectors.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-22T08:59:02.251Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c119e0f4197a8e3b3cb44f

Added to database: 3/23/2026, 10:45:52 AM

Last enriched: 3/30/2026, 8:22:44 PM

Last updated: 5/7/2026, 5:00:30 AM

Views: 109

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses