Browse all 5 CVE security advisories affecting Latchset. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Latchset is a physical access control system securing entry points in commercial and residential properties. Historically, it has faced vulnerabilities including remote code execution, authentication bypass, and privilege escalation, often stemming from insecure default configurations and firmware flaws. The system typically connects to networks via cloud services, creating potential attack vectors for unauthorized access. While no major public incidents have been widely documented, its five CVE records indicate persistent security concerns, particularly around weak encryption and improper input validation. Organizations implementing latchset should prioritize regular firmware updates and network segmentation to mitigate risks associated with these known vulnerabilities.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-11568 | Luksmeta: data corruption when handling luks1 partitions with luksmeta — luksmetaCWE-1284 | 4.4 | Medium | 2025-10-15 |
This page lists every published CVE security advisory associated with Latchset. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.