Vulnerabilites related to cypress - cyw20707ua1kffb4g
CVE-2018-19860 (GCVE-0-2018-19860)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
https://www.broadcom.com/support/resources/product-security-center | x_refsource_MISC | |
https://source.android.com/security/bulletin/2019-05-01 | x_refsource_CONFIRM | |
https://support.apple.com/kb/HT210348 | x_refsource_CONFIRM | |
http://seclists.org/fulldisclosure/2019/Jul/22 | mailing-list, x_refsource_FULLDISC | |
https://seclists.org/bugtraq/2019/Aug/21 | mailing-list, x_refsource_BUGTRAQ | |
http://seclists.org/fulldisclosure/2019/Aug/11 | mailing-list, x_refsource_FULLDISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T11:44:20.802Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.broadcom.com/support/resources/product-security-center" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://source.android.com/security/bulletin/2019-05-01" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT210348" }, { "name": "20190723 APPLE-SA-2019-7-22-2 macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2019/Jul/22" }, { "name": "20190814 APPLE-SA-2019-8-13-1 Additional information for APPLE-SA-2019-7-22-2 macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Aug/21" }, { "name": "20190816 APPLE-SA-2019-8-13-1 Additional information for APPLE-SA-2019-7-22-2 macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2019/Aug/11" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Broadcom firmware before summer 2014 on Nexus 5 BCM4335C0 2012-12-11, Raspberry Pi 3 BCM43438A1 2014-06-02, and unspecifed other devices does not properly restrict LMP commnds and executes certain memory contents upon receiving an LMP command, as demonstrated by executing an HCI command." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-16T18:06:06", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.broadcom.com/support/resources/product-security-center" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://source.android.com/security/bulletin/2019-05-01" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT210348" }, { "name": "20190723 APPLE-SA-2019-7-22-2 macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2019/Jul/22" }, { "name": "20190814 APPLE-SA-2019-8-13-1 Additional information for APPLE-SA-2019-7-22-2 macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Aug/21" }, { "name": "20190816 APPLE-SA-2019-8-13-1 Additional information for APPLE-SA-2019-7-22-2 macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2019/Aug/11" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-19860", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Broadcom firmware before summer 2014 on Nexus 5 BCM4335C0 2012-12-11, Raspberry Pi 3 BCM43438A1 2014-06-02, and unspecifed other devices does not properly restrict LMP commnds and executes certain memory contents upon receiving an LMP command, as demonstrated by executing an HCI command." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.broadcom.com/support/resources/product-security-center", "refsource": "MISC", "url": "https://www.broadcom.com/support/resources/product-security-center" }, { "name": "https://source.android.com/security/bulletin/2019-05-01", "refsource": "CONFIRM", "url": "https://source.android.com/security/bulletin/2019-05-01" }, { "name": "https://support.apple.com/kb/HT210348", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT210348" }, { "name": "20190723 APPLE-SA-2019-7-22-2 macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2019/Jul/22" }, { "name": "20190814 APPLE-SA-2019-8-13-1 Additional information for APPLE-SA-2019-7-22-2 macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Aug/21" }, { "name": "20190816 APPLE-SA-2019-8-13-1 Additional information for APPLE-SA-2019-7-22-2 macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2019/Aug/11" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-19860", "datePublished": "2019-06-07T16:23:26", "dateReserved": "2018-12-05T00:00:00", "dateUpdated": "2024-08-05T11:44:20.802Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:broadcom:bcm4335c0_firmware:2012-12-11:*:*:*:*:*:*:*", "matchCriteriaId": "CC14D020-381B-4FAF-AD05-B96B3A66C66E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:broadcom:bcm4335c0:-:*:*:*:*:*:*:*", "matchCriteriaId": "4862E27D-8977-4D54-86B0-6E6E32023E65", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:broadcom:bcm43438a1_firmware:2014-06-02:*:*:*:*:*:*:*", "matchCriteriaId": "BCE05EBC-3456-412D-901E-06A8163C2E7C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:broadcom:bcm43438a1:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4388B80-93D2-404C-9810-1FAB698BBCB4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw20702a1kwfbg_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "18A2B651-65C6-4934-B802-DE805722A899", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw20702a1kwfbg:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C93EF95-06DA-420B-BB33-105F7E030D05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw20702a1kwfbgt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C472449C-4A12-4F7A-B738-DE84BFB90E14", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw20702a1kwfbgt:-:*:*:*:*:*:*:*", "matchCriteriaId": "47F2E489-8F23-45FD-854F-140BBB7328B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw20702b0kwfbg_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D11DC94-E91A-438A-BD07-394C088D6C02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw20702b0kwfbg:-:*:*:*:*:*:*:*", "matchCriteriaId": "52A4BDC6-F4B9-4B7E-9933-9F4CB044AFA6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw20702b0kwfbgt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5431C94D-26B0-41C3-904C-75509E05C416", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw20702b0kwfbgt:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE4708B0-0914-4E82-B520-9642C7C001F6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw20703ua1kffb1g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4A21130-3C07-44CA-8F70-EBF480549B6E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw20703ua1kffb1g:-:*:*:*:*:*:*:*", "matchCriteriaId": "FBAD3C17-0958-452E-8D8B-B0F91262A230", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw20703ua1kffb1gt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EE083F2-D42C-4A10-809F-86D24F83B298", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw20703ua1kffb1gt:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2E4E58A-4393-41DC-88B2-E244908A32B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw20704ua1kffb1g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "44510EEF-CBE8-4B82-BA73-F1C1897A0C85", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw20704ua1kffb1g:-:*:*:*:*:*:*:*", "matchCriteriaId": "0AA3EE4D-BB53-4133-B329-D46D17F91466", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw20704ua1kffb1gt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4BB7C0F-BB8E-4397-B08B-677783C8723B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw20704ua1kffb1gt:-:*:*:*:*:*:*:*", "matchCriteriaId": "8408C8ED-E96F-48A6-82A8-26638CDE4231", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw20704ua2kffb1g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8D0513FC-E453-4F38-A4FF-B564D6DE89F7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw20704ua2kffb1g:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A9DFE3F-389E-4EA2-BF70-03B8499CEC66", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw20704ua2kffb1gt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3F1A63D-457F-4136-9480-58B632347AB3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw20704ua2kffb1gt:-:*:*:*:*:*:*:*", "matchCriteriaId": "E03E254E-FD66-4C50-AA10-78740D4F208D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw20705a1kwfbgt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C3A6B51-8629-4B52-BB2F-36D9AF6CA2A8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw20705a1kwfbgt:-:*:*:*:*:*:*:*", "matchCriteriaId": "06273928-995F-461C-925E-2450FA8F801A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw20705b0kwfbg_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7FC0D7D-DD5E-462D-97AA-FF8A1DE020EE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw20705b0kwfbg:-:*:*:*:*:*:*:*", "matchCriteriaId": "6662124B-0DB1-48AA-BDEE-778F8A6BA940", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw20705b0kwfbgt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A649DBFF-37B3-41D8-BD1F-1C00FF53CCDE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw20705b0kwfbgt:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB5F618-0179-4657-8E88-E937AC22B952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw20706ua1kffb1g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F76E4CD8-19B4-420C-AD67-42B46FB9B875", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw20706ua1kffb1g:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AB8B545-56E2-49AB-948A-B55830410B71", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw20706ua1kffb1gt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCB79BF6-04E4-4ABA-AC51-C1783CB4CC5B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw20706ua1kffb1gt:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DC08142-1A78-4332-8566-24B70605263F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw20706ua1kffb4g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1DA937F-C549-41D6-911C-0FBF9899DC29", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw20706ua1kffb4g:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1A5945C-0BAC-438D-9174-05A697F4E728", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw20706ua2kffb4g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECCE5BD8-D38B-4201-B9A2-AC32C0720131", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw20706ua2kffb4g:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A33001B-E155-44C8-834E-ECB067D4498F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw20706ua2kffb4gt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE75CBAF-0B64-40AE-BDF2-F9C16DD89E83", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw20706ua2kffb4gt:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCBA0CA5-4FD8-4A2D-BA1F-7BC685ED01D2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw20707a2kubgt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4A1C3F2-49D4-4582-9567-ED89060F185A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw20707a2kubgt:-:*:*:*:*:*:*:*", "matchCriteriaId": "472D439A-4559-46E4-BCC5-DC864E0302BF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw20707ua1kffb1g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E0DE978-C3A6-4A07-9B5F-9536F7094BB5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw20707ua1kffb1g:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC58BC73-D22F-4236-B7F5-62FAE4CE6E59", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw20707ua1kffb4g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E66C8671-CB42-41B0-A940-B3142090EF38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw20707ua1kffb4g:-:*:*:*:*:*:*:*", "matchCriteriaId": "52EF2D17-A44F-4D99-91F4-77309DE2384D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw20707ua1kffb4gt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "66F8A007-2A3D-4403-A585-32E58CA5887F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw20707ua1kffb4gt:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F1AC83C-51DC-4615-9AB3-34463CE098D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw20707ua2kffb4g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D9844C14-70FC-4259-9F4B-E497D588D9EB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw20707ua2kffb4g:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E58A6C9-FC14-48F7-97C8-5D822644E67E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw20707ua2kffb4gt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E526AB1-4AC5-4D16-AED6-C95A72F53AD8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw20707ua2kffb4gt:-:*:*:*:*:*:*:*", "matchCriteriaId": "45F7F3E1-A725-42A8-A9AF-2B21FB7FA1E9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw20707va1pkwbgt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFAC9B88-AA17-4628-A3C2-871763B22913", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw20707va1pkwbgt:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C2CC411-A91F-4BEE-861D-EF1E25CA1B37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw20707va2pkwbgt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "207372BD-0EFF-4B02-A063-C790AA1B9059", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw20707va2pkwbgt:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CF4EC98-722C-4662-A6AB-A7BBFA32CD31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw20730a1kfbg_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CED222A-10E6-4DA8-B74B-D5F70F2DC17E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw20730a1kfbg:-:*:*:*:*:*:*:*", "matchCriteriaId": "62B66D4F-CFDB-40A9-9A7D-877021580D97", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw20730a1kfbgt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A0A7D70-4B21-486B-8BC0-5F861881AD82", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw20730a1kfbgt:-:*:*:*:*:*:*:*", "matchCriteriaId": "755E29AE-752E-4AB6-9A2F-B639D0EE44E9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw20730a1kml2g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5511037-CF47-4370-8BF3-CA7EFA37A9D5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw20730a1kml2g:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFE92EE2-B27C-4999-9D2A-F2F026BF2A12", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw20730a1kml2gt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59E7F12B-5B62-4CBA-B045-98535694B730", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw20730a1kml2gt:-:*:*:*:*:*:*:*", "matchCriteriaId": "290DBF29-2CDA-4A46-B9C1-2BD7CCF2CB91", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw20730a1kmlg_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "05ACD914-EACB-4451-903C-EDE9167D4AE2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw20730a1kmlg:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C2312A1-CB16-4A05-ACBD-481F4970CCEF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw20730a1kmlgt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "51635BB3-9DB9-4FBB-9A6F-9DCBF1C5ED01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw20730a1kmlgt:-:*:*:*:*:*:*:*", "matchCriteriaId": "A60E9176-AC41-471C-8A2B-05BEF0B5A418", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw20730a2kfbg_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE67B90B-A32A-4381-8623-2C7E96BC8915", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw20730a2kfbg:-:*:*:*:*:*:*:*", "matchCriteriaId": "08C41F30-9947-482D-A5AA-4C80118B5A4D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw20730a2kfbgt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "04E74358-9201-45DC-A5F6-093407B14CF7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw20730a2kfbgt:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC80C4A3-6C96-4142-9F55-45102EB4D449", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw20730a2kml2g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B90CF8F5-8B6C-4E60-B6FE-1144A8B9AA3B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw20730a2kml2g:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2D312C6-F529-42A0-93F8-C9075835BB5D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw20730a2kml2gt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "808AC86B-8833-4D38-A011-EFD07FA1A2B5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw20730a2kml2gt:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FDACFF9-1F9A-44C4-8A86-841850BD160F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw20733a1kfb1gt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8D8AE55-ED49-4AAB-9F91-4E7F6E4F4093", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw20733a1kfb1gt:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A600E61-EDC4-44E5-83B7-A628EE056DB0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw20733a2kfb1g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DBC40ED7-83FD-4065-B950-3A6995380F51", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw20733a2kfb1g:-:*:*:*:*:*:*:*", "matchCriteriaId": "8FA80EEA-E1F6-42D1-B5B3-73D22E496C55", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw20733a2kfb1gt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CCA5AD2-0D73-4C80-A75A-72A2883C8FFB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw20733a2kfb1gt:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA54C4D0-DAF8-41B6-B2E1-26F9E98C9614", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw20733a2kml1g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BDD6CF36-9EC5-4937-A2B6-E46DCF08487B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw20733a2kml1g:-:*:*:*:*:*:*:*", "matchCriteriaId": "666EEC7B-C190-4D3F-8D7F-52B7024D6A20", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw20733a2kml1gt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C51599B-6429-488A-80A6-3230405A1077", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw20733a2kml1gt:-:*:*:*:*:*:*:*", "matchCriteriaId": "960412CA-FB9E-4F0A-815D-9830C6ED3AC6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw20733a3kfb1g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "08AAD371-3BBA-45ED-9572-A8A8C7BEF3B5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw20733a3kfb1g:-:*:*:*:*:*:*:*", "matchCriteriaId": "65E2BF18-EBBA-4D68-96CD-8B328834994B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw20733a3kfb1gt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A940F95-77F6-4D28-9FA6-9E8663A01378", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw20733a3kfb1gt:-:*:*:*:*:*:*:*", "matchCriteriaId": "EDDC26E7-7EEF-4DAF-AE53-210E738871AE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw20733a3kfb2gt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3C90F0C-FCDC-41FE-AB91-F31AA2CD51D9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw20733a3kfb2gt:-:*:*:*:*:*:*:*", "matchCriteriaId": "23B8B4CF-98E7-4B93-9B78-597F86935E0A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw20733a3kml1g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2FA5EF22-DE02-4B11-B470-981F79587848", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw20733a3kml1g:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E174189-FB30-471A-BD70-BB3E27617C7C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw20733a3kml1gt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1ED4BCED-E5A5-4E12-8ACA-6BEA188C5936", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw20733a3kml1gt:-:*:*:*:*:*:*:*", "matchCriteriaId": "04C331C4-AEE8-496A-8A86-A62EFC678A19", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw20734ua1kffb3g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E59AAC29-F455-486C-A728-2B01CADAF42E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw20734ua1kffb3g:-:*:*:*:*:*:*:*", "matchCriteriaId": "DBCE3C13-F2E7-4FCA-99FE-ED10054B3BD9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw20734ua1kffb3gt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6EA2382E-F41A-4E2B-A6FC-4A9FEA9776FF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw20734ua1kffb3gt:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DAC9C8A-715A-4F8C-A5FD-33CA174B70BF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw20734ua2kffb3g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "49DBE0B6-C582-4CD4-A161-B5EE6DC94870", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw20734ua2kffb3g:-:*:*:*:*:*:*:*", "matchCriteriaId": "15484332-AEA4-406D-B862-1228442953AC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw20734ua2kffb3gt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C172ACC7-36E6-4A18-B714-33B4B7CB9ECC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw20734ua2kffb3gt:-:*:*:*:*:*:*:*", "matchCriteriaId": "469E0E29-CEA6-4C70-AB16-F63A951D0BA8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw43438kubgt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "69BCDD3B-8EB0-4D90-8659-257F230FC7DF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw43438kubgt:-:*:*:*:*:*:*:*", "matchCriteriaId": "46A5EE4E-04EE-4A27-82E8-BF02CEDA2ACA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw4343w1kubgt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F30A2A18-C517-4329-9BAC-6FD5AA888F88", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw4343w1kubgt:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C72A4DF-B8C0-4CF3-8782-8443C2C8B3AB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw4343wkubgt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8242D59-D18E-49F4-A668-E4EE685A95B2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw4343wkubgt:-:*:*:*:*:*:*:*", "matchCriteriaId": "16E3E3AD-A4F5-403E-97A1-9EF5524F5835", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw4343wkwbgt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B06B7BF-D719-4DD8-BAC5-5B4AE9ACC43D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw4343wkwbgt:-:*:*:*:*:*:*:*", "matchCriteriaId": "C134DFEA-F4CD-49B5-9FAF-346789557120", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw4354kkwbgt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "13BE4C20-8CF0-4D1C-BA23-1B986FD2CDBE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw4354kkwbgt:-:*:*:*:*:*:*:*", "matchCriteriaId": "E163F129-6BEE-48AA-B44E-35C582D27EE6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw4354xkubgt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "933D705D-CC54-4737-8F06-5542B85A5E0A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw4354xkubgt:-:*:*:*:*:*:*:*", "matchCriteriaId": "94B4976F-546C-4FB3-8C3A-14D8E3AFA8A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw89071a1cubxgt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D3F6269E-A9A8-47BE-86C7-15FDD76873F1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw89071a1cubxgt:-:*:*:*:*:*:*:*", "matchCriteriaId": "D78AB288-7CC1-4168-BB89-D26D5DC6FA07", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw89072brfb5g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "16A8C390-5A46-44FA-B776-0BB51889A69E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw89072brfb5g:-:*:*:*:*:*:*:*", "matchCriteriaId": "D110AF17-759A-41A2-BE23-648BDD38CDE2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw89072brfb5gt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0025B560-1F99-4B24-873E-D2977A6AB75A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw89072brfb5gt:-:*:*:*:*:*:*:*", "matchCriteriaId": "CCEC8059-4C3B-45A8-A57B-27C463E0BCA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw89335l2cubgt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C84BFBCA-F5B2-4C83-A103-5DD5AAC74AE3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw89335l2cubgt:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBCD798E-284C-4D1A-AF1A-CFD0936D2703", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cypress:cyw89335lcubgt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2C758EC-B855-41B4-A251-870DEE332E56", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cypress:cyw89335lcubgt:-:*:*:*:*:*:*:*", "matchCriteriaId": "4396A7CA-BB67-45E7-9250-F2132FA41730", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Broadcom firmware before summer 2014 on Nexus 5 BCM4335C0 2012-12-11, Raspberry Pi 3 BCM43438A1 2014-06-02, and unspecifed other devices does not properly restrict LMP commnds and executes certain memory contents upon receiving an LMP command, as demonstrated by executing an HCI command." }, { "lang": "es", "value": "Fue encontrada una Vulnerabilidad en el firmware de Broadcom anterior al verano 2014 en Nexus 5 BCM4335C0 11-12-2012, Raspberry PI 3 BCM43438A1 02-06-2014 y otros dispositivos sin especificar, no restringe correctamente los comandos LMP y ejecuta ciertos contenidos de memoria al recibir un comando LMP, como es demostrado al ejecutar un comando HCI." } ], "id": "CVE-2018-19860", "lastModified": "2024-11-21T03:58:42.217", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-06-07T17:29:00.740", "references": [ { "source": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2019/Aug/11" }, { "source": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2019/Jul/22" }, { "source": "cve@mitre.org", "url": "https://seclists.org/bugtraq/2019/Aug/21" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://source.android.com/security/bulletin/2019-05-01" }, { "source": "cve@mitre.org", "url": "https://support.apple.com/kb/HT210348" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.broadcom.com/support/resources/product-security-center" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2019/Aug/11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2019/Jul/22" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://seclists.org/bugtraq/2019/Aug/21" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://source.android.com/security/bulletin/2019-05-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.apple.com/kb/HT210348" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.broadcom.com/support/resources/product-security-center" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-732" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
var-201906-1114
Vulnerability from variot
Broadcom firmware before summer 2014 on Nexus 5 BCM4335C0 2012-12-11, Raspberry Pi 3 BCM43438A1 2014-06-02, and unspecifed other devices does not properly restrict LMP commnds and executes certain memory contents upon receiving an LMP command, as demonstrated by executing an HCI command. Broadcom BCM4335C0 and BCM43438A1 Firmware contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Google Android is prone to a remote code execution vulnerability. Attackers can exploit this issue to execute arbitrary code within the context of a privileged process. Failed exploits may result in denial-of-service conditions. This issue is being tracked by Android Bug ID A-122249979. Android is a Linux-based open source operating system developed by Google and the Open Handheld Alliance (OHA). -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
APPLE-SA-2019-8-13-1 Additional information for APPLE-SA-2019-7-22-2 macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra
macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra address the following:
AppleGraphicsControl Available for: macOS Mojave 10.14.5 Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2019-8693: Arash Tohidi of Solita
autofs Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS Mojave 10.14.5 Impact: Extracting a zip file containing a symbolic link to an endpoint in an NFS mount that is attacker controlled may bypass Gatekeeper Description: This was addressed with additional checks by Gatekeeper on files mounted through a network share. CVE-2019-8656: Filippo Cavallarin
Bluetooth Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS Mojave 10.14.5 Impact: A remote attacker may be able to cause arbitrary code execution Description: A memory corruption issue was addressed with improved input validation. CVE-2018-19860
Bluetooth Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS Mojave 10.14.5 Impact: An attacker in a privileged network position may be able to intercept Bluetooth traffic (Key Negotiation of Bluetooth - KNOB) Description: An input validation issue existed in Bluetooth. This issue was addressed with improved input validation. CVE-2019-9506: Daniele Antonioli of SUTD, Singapore, Dr. Nils Ole Tippenhauer of CISPA, Germany, and Prof. Kasper Rasmussen of University of Oxford, England Entry added August 13, 2019
Carbon Core Available for: macOS Mojave 10.14.5 Impact: A remote attacker may be able to cause arbitrary code execution Description: A use after free issue was addressed with improved memory management. CVE-2019-8661: Natalie Silvanovich of Google Project Zero
Core Data Available for: macOS Mojave 10.14.5 Impact: A remote attacker may be able to leak memory Description: An out-of-bounds read was addressed with improved input validation. CVE-2019-8646: Natalie Silvanovich of Google Project Zero
Core Data Available for: macOS Mojave 10.14.5 Impact: A remote attacker may be able to cause unexpected application termination or arbitrary code execution Description: A memory corruption issue was addressed with improved input validation. CVE-2019-8660: Samuel Groß and Natalie Silvanovich of Google Project Zero
Disk Management Available for: macOS Mojave 10.14.5 Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2019-8697: ccpwd working with Trend Micro's Zero Day Initiative
FaceTime Available for: macOS Mojave 10.14.5 Impact: A remote attacker may be able to cause arbitrary code execution Description: A memory corruption issue was addressed with improved input validation. CVE-2019-8648: Tao Huang and Tielei Wang of Team Pangu
Found in Apps Available for: macOS Mojave 10.14.5 Impact: A remote attacker may be able to leak memory Description: This issue was addressed with improved checks. CVE-2019-8663: Natalie Silvanovich of Google Project Zero
Foundation Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS Mojave 10.14.5 Impact: A remote attacker may be able to cause unexpected application termination or arbitrary code execution Description: An out-of-bounds read was addressed with improved input validation. CVE-2019-8641: Samuel Groß and Natalie Silvanovich of Google Project Zero
Grapher Available for: macOS Mojave 10.14.5 Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2019-8695: riusksk of VulWar Corp working with Trend Micro's Zero Day Initiative
Graphics Drivers Available for: macOS High Sierra 10.13.6, macOS Mojave 10.14.5 Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2019-8691: Aleksandr Tarasikov (@astarasikov), Arash Tohidi of Solita, Lilang Wu and Moony Li of Trend Micro's Mobile Security Research Team working with Trend Micro's Zero Day Initiative CVE-2019-8692: Lilang Wu and Moony Li of Trend Micro Mobile Security Research Team working with Trend Micro's Zero Day Initiative
Heimdal Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS Mojave 10.14.5 Impact: An issue existed in Samba that may allow attackers to perform unauthorized actions by intercepting communications between services Description: This issue was addressed with improved checks to prevent unauthorized actions. CVE-2018-16860: Isaac Boukris and Andrew Bartlett of the Samba Team and Catalyst
IOAcceleratorFamily Available for: macOS Mojave 10.14.5 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2019-8694: Arash Tohidi of Solita
libxslt Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS Mojave 10.14.5 Impact: A remote attacker may be able to view sensitive information Description: A stack overflow was addressed with improved input validation. CVE-2019-13118: found by OSS-Fuzz
Quick Look Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS Mojave 10.14.5 Impact: An attacker may be able to trigger a use-after-free in an application deserializing an untrusted NSDictionary Description: This issue was addressed with improved checks. CVE-2019-8662: Natalie Silvanovich and Samuel Groß of Google Project Zero
Security Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6 Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2019-8697: ccpwd working with Trend Micro's Zero Day Initiative
Siri Available for: macOS Mojave 10.14.5 Impact: A remote attacker may be able to leak memory Description: An out-of-bounds read was addressed with improved input validation. CVE-2019-8646: Natalie Silvanovich of Google Project Zero
Time Machine Available for: macOS Mojave 10.14.5 Impact: The encryption status of a Time Machine backup may be incorrect Description: An inconsistent user interface issue was addressed with improved state management. CVE-2019-8667: Roland Kletzing of cyber:con GmbH
UIFoundation Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS Mojave 10.14.5 Impact: Parsing a maliciously crafted office document may lead to an unexpected application termination or arbitrary code execution Description: An out-of-bounds read was addressed with improved input validation. CVE-2019-8657: riusksk of VulWar Corp working with Trend Micro's Zero Day Initiative
Additional recognition
Classroom We would like to acknowledge Jeff Johnson of underpassapp.com for their assistance.
Game Center We would like to acknowledge Min (Spark) Zheng and Xiaolong Bai of Alibaba Inc. for their assistance.
Installation note:
macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra may be obtained from the Mac App Store or Apple's Software Downloads web site: https://support.apple.com/downloads/
Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE-----
iQJdBAEBCABHFiEEDNXJVNCJJEAVmJdZeC9tht7TK3EFAl1S688pHHByb2R1Y3Qt c2VjdXJpdHktbm9yZXBseUBsaXN0cy5hcHBsZS5jb20ACgkQeC9tht7TK3Hiog/+ PcWPEhxDpnU1ctoVPhyoqkV1tUs8z3hdNyX/tPtQZIQVFB7No1Md0GX8Zrv2libb LwrbU25ewe82XE9Es6ngxTdkRaREn8+hm9gxYPCMDXyKRlv904Q1b4zthYUt7/NO 7RG6ZRHEINOQORzrDsmgT/X6TukIy73HNob+4xZJTdJe9ZU3/zDCaqUgyUJSodou vsVFR3oqkwbVby4eT9+YbxJWMvVoFfB1+Qqo1w9kN7WXcYK3gb7sGtnNQlrE70kR pLRogcmwTQsi+sTm8bxQsuXXjdtTHeeCf0FRJg8NY5wZmdV9lNOghtmNxfTwIuir VeWusIgZWaK7IbgHW3PRYv3Sbrk40zcOraDsPv2rdgjOj4ReVyKHw5/f5Fyhcn+v WnIC4iNIBurz0HZU91QqD58Sqp+HtWl8xkM3ZW+Kd9LjnLty3fNw6Au5Aw8DTHzN 5F+lz7JRVV3+j7AYELog3WV6mdzMKW85gJRJtwXJ8hHSYZnvat06faFlPcDiKjBW rW7BehRykZpmZtaSZjL25IeOuXJHHdRfvabuTZ3nk47SSn7EJJ3xFBnvw6TgVFX+ TvmcUg5FinTSR81NkIY0ux6x1kuV/4vIUGZ4O0Houf/FoUhMQvig9ZkSw2B+Ynbd Xl3qBT4SVPWQyFAvjHwjCZA+GpNsnEKgZm8SlYVgqog= =tCwo -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201906-1114", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "cyw20733a2kml1gt", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "cyw20733a2kfb1gt", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "cyw20706ua1kffb4g", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "cyw20707va2pkwbgt", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "bcm43438a1", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "2014-06-02" }, { "model": "cyw4343w1kubgt", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "cyw20704ua1kffb1g", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "cyw20705a1kwfbgt", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "cyw20702b0kwfbgt", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "cyw4343wkwbgt", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "cyw20730a1kml2gt", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "cyw20730a1kmlg", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "cyw20705b0kwfbg", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "cyw20733a2kml1g", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "cyw20734ua1kffb3g", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "cyw20733a3kfb1g", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "cyw20734ua2kffb3g", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "cyw20704ua2kffb1g", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "cyw20704ua2kffb1gt", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "cyw20707va1pkwbgt", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "cyw89335l2cubgt", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "bcm4335c0", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": "2012-12-11" }, { "model": "cyw20702a1kwfbgt", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "cyw20704ua1kffb1gt", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "cyw20707ua2kffb4gt", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "cyw20703ua1kffb1gt", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "cyw20707ua1kffb4g", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "cyw20707a2kubgt", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "cyw20733a3kfb1gt", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "cyw20706ua1kffb1gt", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "cyw20730a2kfbg", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "cyw4354xkubgt", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "cyw20730a1kmlgt", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "cyw20733a3kml1gt", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "cyw20702b0kwfbg", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "cyw89072brfb5gt", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "cyw20730a2kfbgt", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "cyw20730a1kml2g", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "cyw20730a1kfbgt", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "cyw20730a2kml2g", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "cyw89071a1cubxgt", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "cyw89335lcubgt", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "cyw20707ua2kffb4g", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "cyw20733a1kfb1gt", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "cyw20730a1kfbg", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "cyw20707ua1kffb4gt", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "cyw20733a3kml1g", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "cyw20702a1kwfbg", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "cyw20703ua1kffb1g", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "cyw4354kkwbgt", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "cyw20730a2kml2gt", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "cyw20733a3kfb2gt", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "cyw20733a2kfb1g", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "cyw20706ua1kffb1g", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "cyw20705b0kwfbgt", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "cyw20707ua1kffb1g", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "cyw20734ua2kffb3gt", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "cyw20706ua2kffb4gt", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "cyw43438kubgt", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "cyw89072brfb5g", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "cyw20706ua2kffb4g", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "cyw4343wkubgt", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "cyw20734ua1kffb3gt", "scope": "eq", "trust": 1.0, "vendor": "cypress", "version": null }, { "model": "bcm43438a1", "scope": null, "trust": 0.8, "vendor": "broadcom", "version": null }, { "model": "bcm4355c0", "scope": null, "trust": 0.8, "vendor": "broadcom", "version": null }, { "model": "cyw20702a1kwfbg", "scope": null, "trust": 0.8, "vendor": "cypress", "version": null }, { "model": "cyw20702a1kwfbgt", "scope": null, "trust": 0.8, "vendor": "cypress", "version": null }, { "model": "cyw20702b0kwfbg", "scope": null, "trust": 0.8, "vendor": "cypress", "version": null }, { "model": "cyw20702b0kwfbgt", "scope": null, "trust": 0.8, "vendor": "cypress", "version": null }, { "model": "cyw20703ua1kffb1g", "scope": null, "trust": 0.8, "vendor": "cypress", "version": null }, { "model": "cyw20703ua1kffb1gt", "scope": null, "trust": 0.8, "vendor": "cypress", "version": null }, { "model": "cyw20704ua1kffb1g", "scope": null, "trust": 0.8, "vendor": "cypress", "version": null }, { "model": "cyw20704ua1kffb1gt", "scope": null, "trust": 0.8, "vendor": "cypress", "version": null }, { "model": "android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" } ], "sources": [ { "db": "BID", "id": "108277" }, { "db": "JVNDB", "id": "JVNDB-2018-015613" }, { "db": "NVD", "id": "CVE-2018-19860" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:broadcom:bcm43438a1_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:broadcom:bcm4355c0_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:cypress:cyw20702a1kwfbg_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:cypress:cyw20702a1kwfbgt_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:cypress:cyw20702b0kwfbg_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:cypress:cyw20702b0kwfbgt_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:cypress:cyw20703ua1kffb1g_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:cypress:cyw20703ua1kffb1gt_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:cypress:cyw20704ua1kffb1g_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:cypress:cyw20704ua1kffb1gt_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-015613" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Apple", "sources": [ { "db": "PACKETSTORM", "id": "153723" }, { "db": "PACKETSTORM", "id": "154054" }, { "db": "CNNVD", "id": "CNNVD-201905-176" } ], "trust": 0.8 }, "cve": "CVE-2018-19860", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.5, "id": "CVE-2018-19860", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.5, "id": "VHN-130562", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:A/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2018-19860", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2018-19860", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2018-19860", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201905-176", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-130562", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-130562" }, { "db": "JVNDB", "id": "JVNDB-2018-015613" }, { "db": "CNNVD", "id": "CNNVD-201905-176" }, { "db": "NVD", "id": "CVE-2018-19860" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Broadcom firmware before summer 2014 on Nexus 5 BCM4335C0 2012-12-11, Raspberry Pi 3 BCM43438A1 2014-06-02, and unspecifed other devices does not properly restrict LMP commnds and executes certain memory contents upon receiving an LMP command, as demonstrated by executing an HCI command. Broadcom BCM4335C0 and BCM43438A1 Firmware contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Google Android is prone to a remote code execution vulnerability. \nAttackers can exploit this issue to execute arbitrary code within the context of a privileged process. Failed exploits may result in denial-of-service conditions. \nThis issue is being tracked by Android Bug ID A-122249979. Android is a Linux-based open source operating system developed by Google and the Open Handheld Alliance (OHA). -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\nAPPLE-SA-2019-8-13-1 Additional information for\nAPPLE-SA-2019-7-22-2 macOS Mojave 10.14.6, Security Update\n2019-004 High Sierra, Security Update 2019-004 Sierra\n\nmacOS Mojave 10.14.6, Security Update 2019-004 High Sierra,\nSecurity Update 2019-004 Sierra address the\nfollowing:\n\nAppleGraphicsControl\nAvailable for: macOS Mojave 10.14.5\nImpact: An application may be able to read restricted memory\nDescription: A validation issue was addressed with improved input\nsanitization. \nCVE-2019-8693: Arash Tohidi of Solita\n\nautofs\nAvailable for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS\nMojave 10.14.5\nImpact: Extracting a zip file containing a symbolic link to an\nendpoint in an NFS mount that is attacker controlled may bypass\nGatekeeper\nDescription: This was addressed with additional checks by Gatekeeper\non files mounted through a network share. \nCVE-2019-8656: Filippo Cavallarin\n\nBluetooth\nAvailable for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS\nMojave 10.14.5\nImpact: A remote attacker may be able to cause arbitrary code\nexecution\nDescription: A memory corruption issue was addressed with improved\ninput validation. \nCVE-2018-19860\n\nBluetooth\nAvailable for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS\nMojave 10.14.5\nImpact: An attacker in a privileged network position may be able to\nintercept Bluetooth traffic (Key Negotiation of Bluetooth - KNOB)\nDescription: An input validation issue existed in Bluetooth. This\nissue was addressed with improved input validation. \nCVE-2019-9506: Daniele Antonioli of SUTD, Singapore, Dr. Nils Ole\nTippenhauer of CISPA, Germany, and Prof. Kasper Rasmussen of\nUniversity of Oxford, England\nEntry added August 13, 2019\n\nCarbon Core\nAvailable for: macOS Mojave 10.14.5\nImpact: A remote attacker may be able to cause arbitrary code\nexecution\nDescription: A use after free issue was addressed with improved\nmemory management. \nCVE-2019-8661: Natalie Silvanovich of Google Project Zero\n\nCore Data\nAvailable for: macOS Mojave 10.14.5\nImpact: A remote attacker may be able to leak memory\nDescription: An out-of-bounds read was addressed with improved input\nvalidation. \nCVE-2019-8646: Natalie Silvanovich of Google Project Zero\n\nCore Data\nAvailable for: macOS Mojave 10.14.5\nImpact: A remote attacker may be able to cause unexpected application\ntermination or arbitrary code execution\nDescription: A memory corruption issue was addressed with improved\ninput validation. \nCVE-2019-8660: Samuel Gro\u00df and Natalie Silvanovich of Google Project\nZero\n\nDisk Management\nAvailable for: macOS Mojave 10.14.5\nImpact: An application may be able to execute arbitrary code with\nsystem privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2019-8697: ccpwd working with Trend Micro\u0027s Zero Day Initiative\n\nFaceTime\nAvailable for: macOS Mojave 10.14.5\nImpact: A remote attacker may be able to cause arbitrary code\nexecution\nDescription: A memory corruption issue was addressed with improved\ninput validation. \nCVE-2019-8648: Tao Huang and Tielei Wang of Team Pangu\n\nFound in Apps\nAvailable for: macOS Mojave 10.14.5\nImpact: A remote attacker may be able to leak memory\nDescription: This issue was addressed with improved checks. \nCVE-2019-8663: Natalie Silvanovich of Google Project Zero\n\nFoundation\nAvailable for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS\nMojave 10.14.5\nImpact: A remote attacker may be able to cause unexpected application\ntermination or arbitrary code execution\nDescription: An out-of-bounds read was addressed with improved input\nvalidation. \nCVE-2019-8641: Samuel Gro\u00df and Natalie Silvanovich of Google Project\nZero\n\nGrapher\nAvailable for: macOS Mojave 10.14.5\nImpact: An application may be able to execute arbitrary code with\nsystem privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2019-8695: riusksk of VulWar Corp working with Trend Micro\u0027s Zero\nDay Initiative\n\nGraphics Drivers\nAvailable for: macOS High Sierra 10.13.6, macOS Mojave 10.14.5\nImpact: An application may be able to read restricted memory\nDescription: A validation issue was addressed with improved input\nsanitization. \nCVE-2019-8691: Aleksandr Tarasikov (@astarasikov), Arash Tohidi of\nSolita, Lilang Wu and Moony Li of Trend Micro\u0027s Mobile Security\nResearch Team working with Trend Micro\u0027s Zero Day Initiative\nCVE-2019-8692: Lilang Wu and Moony Li of Trend Micro Mobile Security\nResearch Team working with Trend Micro\u0027s Zero Day Initiative\n\nHeimdal\nAvailable for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS\nMojave 10.14.5\nImpact: An issue existed in Samba that may allow attackers to perform\nunauthorized actions by intercepting communications between services\nDescription: This issue was addressed with improved checks to prevent\nunauthorized actions. \nCVE-2018-16860: Isaac Boukris and Andrew Bartlett of the Samba Team\nand Catalyst\n\nIOAcceleratorFamily\nAvailable for: macOS Mojave 10.14.5\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2019-8694: Arash Tohidi of Solita\n\nlibxslt\nAvailable for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS\nMojave 10.14.5\nImpact: A remote attacker may be able to view sensitive information\nDescription: A stack overflow was addressed with improved input\nvalidation. \nCVE-2019-13118: found by OSS-Fuzz\n\nQuick Look\nAvailable for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS\nMojave 10.14.5\nImpact: An attacker may be able to trigger a use-after-free in an\napplication deserializing an untrusted NSDictionary\nDescription: This issue was addressed with improved checks. \nCVE-2019-8662: Natalie Silvanovich and Samuel Gro\u00df of Google Project\nZero\n\nSecurity\nAvailable for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6\nImpact: An application may be able to execute arbitrary code with\nsystem privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2019-8697: ccpwd working with Trend Micro\u0027s Zero Day Initiative\n\nSiri\nAvailable for: macOS Mojave 10.14.5\nImpact: A remote attacker may be able to leak memory\nDescription: An out-of-bounds read was addressed with improved input\nvalidation. \nCVE-2019-8646: Natalie Silvanovich of Google Project Zero\n\nTime Machine\nAvailable for: macOS Mojave 10.14.5\nImpact: The encryption status of a Time Machine backup may be\nincorrect\nDescription: An inconsistent user interface issue was addressed with\nimproved state management. \nCVE-2019-8667: Roland Kletzing of cyber:con GmbH\n\nUIFoundation\nAvailable for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS\nMojave 10.14.5\nImpact: Parsing a maliciously crafted office document may lead to an\nunexpected application termination or arbitrary code execution\nDescription: An out-of-bounds read was addressed with improved input\nvalidation. \nCVE-2019-8657: riusksk of VulWar Corp working with Trend Micro\u0027s Zero\nDay Initiative\n\nAdditional recognition\n\nClassroom\nWe would like to acknowledge Jeff Johnson of underpassapp.com for\ntheir assistance. \n\nGame Center\nWe would like to acknowledge Min (Spark) Zheng and Xiaolong Bai of\nAlibaba Inc. for their assistance. \n\nInstallation note:\n\nmacOS Mojave 10.14.6, Security Update 2019-004 High Sierra,\nSecurity Update 2019-004 Sierra may be obtained from the\nMac App Store or Apple\u0027s Software Downloads web site:\nhttps://support.apple.com/downloads/\n\nInformation will also be posted to the Apple Security Updates\nweb site: https://support.apple.com/kb/HT201222\n\nThis message is signed with Apple\u0027s Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n-----BEGIN PGP SIGNATURE-----\n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\nXl3qBT4SVPWQyFAvjHwjCZA+GpNsnEKgZm8SlYVgqog=\n=tCwo\n-----END PGP SIGNATURE-----\n", "sources": [ { "db": "NVD", "id": "CVE-2018-19860" }, { "db": "JVNDB", "id": "JVNDB-2018-015613" }, { "db": "BID", "id": "108277" }, { "db": "VULHUB", "id": "VHN-130562" }, { "db": "PACKETSTORM", "id": "153723" }, { "db": "PACKETSTORM", "id": "154054" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-19860", "trust": 3.0 }, { "db": "BID", "id": "108277", "trust": 1.0 }, { "db": "JVNDB", "id": "JVNDB-2018-015613", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201905-176", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "153723", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2019.2743", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-130562", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "154054", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-130562" }, { "db": "BID", "id": "108277" }, { "db": "JVNDB", "id": "JVNDB-2018-015613" }, { "db": "PACKETSTORM", "id": "153723" }, { "db": "PACKETSTORM", "id": "154054" }, { "db": "CNNVD", "id": "CNNVD-201905-176" }, { "db": "NVD", "id": "CVE-2018-19860" } ] }, "id": "VAR-201906-1114", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-130562" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T19:48:35.638000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Product Security Center", "trust": 0.8, "url": "https://www.broadcom.com/support/resources/product-security-center" }, { "title": "Android Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=92320" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-015613" }, { "db": "CNNVD", "id": "CNNVD-201905-176" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-732", "trust": 1.1 }, { "problemtype": "CWE-264", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-130562" }, { "db": "JVNDB", "id": "JVNDB-2018-015613" }, { "db": "NVD", "id": "CVE-2018-19860" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.8, "url": "https://source.android.com/security/bulletin/2019-05-01" }, { "trust": 1.7, "url": "https://seclists.org/bugtraq/2019/aug/21" }, { "trust": 1.7, "url": "https://support.apple.com/kb/ht210348" }, { "trust": 1.7, "url": "http://seclists.org/fulldisclosure/2019/jul/22" }, { "trust": 1.7, "url": "http://seclists.org/fulldisclosure/2019/aug/11" }, { "trust": 1.7, "url": "https://www.broadcom.com/support/resources/product-security-center" }, { "trust": 1.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19860" }, { "trust": 0.9, "url": "http://www.android.com/" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19860" }, { "trust": 0.6, "url": "https://support.apple.com/en-au/ht210348" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/153723/apple-security-advisory-2019-7-22-2.html" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/google-android-multiple-vulnerabilities-of-may-2019-29239" }, { "trust": 0.6, "url": "https://www.securityfocus.com/bid/108277" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/apple-macos-multiple-vulnerabilities-29859" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.2743/" }, { "trust": 0.6, "url": "https://support.apple.com/en-us/ht210348" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8691" }, { "trust": 0.2, "url": "https://support.apple.com/kb/ht201222" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-16860" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8695" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8692" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8646" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8694" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-13118" }, { "trust": 0.2, "url": "https://support.apple.com/downloads/" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8693" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8663" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8656" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8648" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8641" }, { "trust": 0.2, "url": "https://www.apple.com/support/security/pgp/" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8660" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8657" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8667" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8697" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8662" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8661" }, { "trust": 0.1, "url": "https://www.apple.com/support/security/pgp/\u003e" }, { "trust": 0.1, "url": "https://support.apple.com/downloads/\u003e" }, { "trust": 0.1, "url": "https://support.apple.com/kb/ht201222\u003e" }, { "trust": 0.1, "url": "http://underpassapp.com/\u003e" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8670" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-9506" } ], "sources": [ { "db": "VULHUB", "id": "VHN-130562" }, { "db": "BID", "id": "108277" }, { "db": "JVNDB", "id": "JVNDB-2018-015613" }, { "db": "PACKETSTORM", "id": "153723" }, { "db": "PACKETSTORM", "id": "154054" }, { "db": "CNNVD", "id": "CNNVD-201905-176" }, { "db": "NVD", "id": "CVE-2018-19860" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-130562" }, { "db": "BID", "id": "108277" }, { "db": "JVNDB", "id": "JVNDB-2018-015613" }, { "db": "PACKETSTORM", "id": "153723" }, { "db": "PACKETSTORM", "id": "154054" }, { "db": "CNNVD", "id": "CNNVD-201905-176" }, { "db": "NVD", "id": "CVE-2018-19860" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-07T00:00:00", "db": "VULHUB", "id": "VHN-130562" }, { "date": "2019-05-06T00:00:00", "db": "BID", "id": "108277" }, { "date": "2019-06-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-015613" }, { "date": "2019-07-23T18:02:22", "db": "PACKETSTORM", "id": "153723" }, { "date": "2019-08-14T18:32:22", "db": "PACKETSTORM", "id": "154054" }, { "date": "2019-05-07T00:00:00", "db": "CNNVD", "id": "CNNVD-201905-176" }, { "date": "2019-06-07T17:29:00.740000", "db": "NVD", "id": "CVE-2018-19860" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-08-24T00:00:00", "db": "VULHUB", "id": "VHN-130562" }, { "date": "2019-05-06T00:00:00", "db": "BID", "id": "108277" }, { "date": "2019-06-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-015613" }, { "date": "2021-10-29T00:00:00", "db": "CNNVD", "id": "CNNVD-201905-176" }, { "date": "2024-11-21T03:58:42.217000", "db": "NVD", "id": "CVE-2018-19860" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201905-176" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Broadcom BCM4335C0 and BCM43438A1 Firmware vulnerabilities related to authorization, authority, and access control", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-015613" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control issues", "sources": [ { "db": "CNNVD", "id": "CNNVD-201905-176" } ], "trust": 0.6 } }