CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

Search Vulnerabilities

 Software

Searching vulnerabilities affecting “anviz”

9 vulnerabilities found for “anviz”

CVE-2019-12394
CRITICAL9.8

Anviz access control devices allow unverified password change which allows remote attackers to change the administrator password without prior authentication.

anviz / management_system
Network
Published Dec 2, 2019
CVE-2019-12390
MEDIUM5.3

Anviz access control devices expose private Information (pin code and name) by allowing remote attackers to query this information without credentials via port tcp/5010.

anviz / anviz_firmware
Network
Published Dec 2, 2019
CVE-2019-12388
HIGH7.5

Anviz access control devices perform cleartext transmission of sensitive information (passwords/pins and names) when replying to query on port tcp/5010.

anviz / anviz_firmware
Network
Published Dec 2, 2019
CVE-2019-12518
CRITICAL9.8

Anviz CrossChex access control management software 4.3.8.0 and 4.3.12 is vulnerable to a buffer overflow vulnerability.

anviz / crosschex+1
Network
Published Dec 2, 2019
CVE-2019-12392
CRITICAL9.8

Anviz access control devices allow remote attackers to issue commands without a password.

anviz / anviz_firmware
Network
Published Dec 2, 2019
CVE-2019-12393
HIGH7.5

Anviz access control devices are vulnerable to replay attacks which could allow attackers to intercept and replay open door requests.

anviz / management_system
Network
Published Dec 2, 2019
CVE-2019-12391
HIGH7.5

The Anviz Management System for access control has insufficient logging for device events such as door open requests.

anviz / management_system
Network
Published Dec 2, 2019
CVE-2019-12389
HIGH7.5

Anviz access control devices expose credentials (names and passwords) by allowing remote attackers to query this information without credentials via port tcp/5010.

anviz / anviz_firmware
Network
Published Dec 2, 2019
CVE-2019-11523
CRITICAL9.8

Anviz Global M3 Outdoor RFID Access Control executes any command received from any source. No authentication/encryption is done. Attackers can fully interact with the device: for example, send the "open door" command, download the users list (which includes RFID codes and passcodes in cleartext), or update/create users. The same attack can be executed on a local network and over the internet (if the device is exposed on a public IP address).

anviz / m3_firmware
Network
Published Jun 6, 2019