Vulnerabilites related to samsung - gear_2
Vulnerability from fkie_nvd
Published
2020-01-22 14:15
Modified
2024-11-21 03:52
Severity ?
Summary
The wpa_supplicant system service in Samsung Galaxy Gear series allows an unprivileged process to fully control the Wi-Fi interface, due to the lack of its D-Bus security policy configurations. This affects Tizen-based firmwares including Samsung Galaxy Gear series before build RE2.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
samsung | galaxy_gear_firmware | * | |
samsung | galaxy_gear | - | |
samsung | gear_2_firmware | * | |
samsung | gear_2 | - | |
samsung | gear_live_firmware | * | |
samsung | gear_live | - | |
samsung | gear_s_firmware | * | |
samsung | gear_s | - | |
samsung | gear_s2_firmware | * | |
samsung | gear_s2 | - | |
samsung | gear_s3_firmware | * | |
samsung | gear_s3 | - | |
samsung | gear_sport_firmware | * | |
samsung | gear_sport | - | |
samsung | gear_fit_firmware | * | |
samsung | gear_fit | - | |
samsung | gear_fit_2_firmware | * | |
samsung | gear_fit_2 | - | |
samsung | gear_fit_2_pro_firmware | * | |
samsung | gear_fit_2_pro | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:galaxy_gear_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "823D208B-3316-42CD-BFAD-F680B2CE04CA", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:galaxy_gear:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B033BF3-3C56-4B7A-92B5-8D1024EB36EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3ACF61B2-D169-4423-9A54-BA0C73BAAA95", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_2:-:*:*:*:*:*:*:*", "matchCriteriaId": "A58D5FF1-9573-4059-9C38-4C6B45812896", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_live_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "94B31103-12C7-460E-B0F0-86D1B036D067", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_live:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1E260EE-D0E5-4506-862E-367D72767A5B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "42163099-D8E7-4509-A9B0-ABCA3260E963", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_s:-:*:*:*:*:*:*:*", "matchCriteriaId": "15C8050C-4FFB-4CE9-AC2E-927C43D0A5ED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_s2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "77C40433-B8BC-4829-B7C5-2EEA66C7827F", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_s2:-:*:*:*:*:*:*:*", "matchCriteriaId": "80E04318-D715-4263-A869-C9203EB7CE75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_s3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A52BB0AA-9EFC-4CC8-AD81-777D63C8E26B", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_s3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB6F5890-C7A5-45B2-BADE-118B53BE2667", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_sport_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "062AEA64-280B-4A80-9E9F-A65225D7A7E9", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_sport:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4D21008-B7FC-4E40-8817-B96A045DB122", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_fit_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F03DF2D-7C51-4633-918E-58B0A5601954", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_fit:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BA573D2-AF1C-4763-9244-95F5104177E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_fit_2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "826565B1-E201-4EF4-B9FD-6D34962188F2", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_fit_2:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A2D9849-D057-41ED-AA8A-D692135B4DC2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_fit_2_pro_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "73864A48-39CC-4196-B18C-AB079D554709", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_fit_2_pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "49E06C7B-5870-4D08-8D48-43EC469A579B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The wpa_supplicant system service in Samsung Galaxy Gear series allows an unprivileged process to fully control the Wi-Fi interface, due to the lack of its D-Bus security policy configurations. This affects Tizen-based firmwares including Samsung Galaxy Gear series before build RE2." }, { "lang": "es", "value": "El servicio de sistema wpa_supplicant en la serie Samsung Galaxy Gear, permite a un proceso no privilegiado controlar completamente la interfaz Wi-Fi, debido a la falta de sus configuraciones de pol\u00edtica de seguridad D-Bus. Esto afecta a los firmwares que se basan ??en Tizen, incluyendo la serie Samsung Galaxy Gear versiones anteriores al build RE2." } ], "id": "CVE-2018-16272", "lastModified": "2024-11-21T03:52:25.960", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-01-22T14:15:11.337", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-01-22 14:15
Modified
2024-11-21 03:52
Severity ?
Summary
Samsung Galaxy Gear series before build RE2 includes the hcidump utility with no privilege or permission restriction. This allows an unprivileged process to dump Bluetooth HCI packets to an arbitrary file path.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
samsung | galaxy_gear_firmware | * | |
samsung | galaxy_gear | - | |
samsung | gear_2_firmware | * | |
samsung | gear_2 | - | |
samsung | gear_live_firmware | * | |
samsung | gear_live | - | |
samsung | gear_s_firmware | * | |
samsung | gear_s | - | |
samsung | gear_s2_firmware | * | |
samsung | gear_s2 | - | |
samsung | gear_s3_firmware | * | |
samsung | gear_s3 | - | |
samsung | gear_sport_firmware | * | |
samsung | gear_sport | - | |
samsung | gear_fit_firmware | * | |
samsung | gear_fit | - | |
samsung | gear_fit_2_firmware | * | |
samsung | gear_fit_2 | - | |
samsung | gear_fit_2_pro_firmware | * | |
samsung | gear_fit_2_pro | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:galaxy_gear_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "823D208B-3316-42CD-BFAD-F680B2CE04CA", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:galaxy_gear:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B033BF3-3C56-4B7A-92B5-8D1024EB36EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3ACF61B2-D169-4423-9A54-BA0C73BAAA95", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_2:-:*:*:*:*:*:*:*", "matchCriteriaId": "A58D5FF1-9573-4059-9C38-4C6B45812896", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_live_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "94B31103-12C7-460E-B0F0-86D1B036D067", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_live:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1E260EE-D0E5-4506-862E-367D72767A5B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "42163099-D8E7-4509-A9B0-ABCA3260E963", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_s:-:*:*:*:*:*:*:*", "matchCriteriaId": "15C8050C-4FFB-4CE9-AC2E-927C43D0A5ED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_s2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "77C40433-B8BC-4829-B7C5-2EEA66C7827F", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_s2:-:*:*:*:*:*:*:*", "matchCriteriaId": "80E04318-D715-4263-A869-C9203EB7CE75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_s3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A52BB0AA-9EFC-4CC8-AD81-777D63C8E26B", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_s3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB6F5890-C7A5-45B2-BADE-118B53BE2667", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_sport_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "062AEA64-280B-4A80-9E9F-A65225D7A7E9", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_sport:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4D21008-B7FC-4E40-8817-B96A045DB122", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_fit_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F03DF2D-7C51-4633-918E-58B0A5601954", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_fit:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BA573D2-AF1C-4763-9244-95F5104177E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_fit_2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "826565B1-E201-4EF4-B9FD-6D34962188F2", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_fit_2:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A2D9849-D057-41ED-AA8A-D692135B4DC2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_fit_2_pro_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "73864A48-39CC-4196-B18C-AB079D554709", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_fit_2_pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "49E06C7B-5870-4D08-8D48-43EC469A579B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Samsung Galaxy Gear series before build RE2 includes the hcidump utility with no privilege or permission restriction. This allows an unprivileged process to dump Bluetooth HCI packets to an arbitrary file path." }, { "lang": "es", "value": "La serie Samsung Galaxy Gear versiones anteriores al build RE2, incluye la utilidad hcidump sin restricci\u00f3n de privilegios o permisos. Esto permite a un proceso no privilegiado descargar paquetes Bluetooth HCI en una ruta de archivo arbitraria." } ], "id": "CVE-2018-16270", "lastModified": "2024-11-21T03:52:25.633", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-01-22T14:15:11.213", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-06-11 15:15
Modified
2024-11-21 05:54
Severity ?
Summary
Improper authentication vulnerability in Tizen bluetooth-frwk prior to Firmware update JUN-2021 Release allows bluetooth attacker to take over the user's bluetooth device without user awareness.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:galaxy_watch_active_2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "63010A7C-58DC-468C-BA3C-F55098E8DEFB", "versionEndExcluding": "5.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:galaxy_watch_active_2:-:*:*:*:*:*:*:*", "matchCriteriaId": "008A8838-4273-49EA-8ABE-590BE4765EE0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:galaxy_watch_active_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "968977C3-E441-4758-9FD7-E10CA68F095C", "versionEndExcluding": "5.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:galaxy_watch_active:-:*:*:*:*:*:*:*", "matchCriteriaId": "43AC7998-096D-4F7C-90BF-F024DEA68569", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:galaxy_watch_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "57C16DE2-8E1D-4F05-BBA2-931A102AA947", "versionEndExcluding": "5.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:galaxy_watch:-:*:*:*:*:*:*:*", "matchCriteriaId": "978A382D-C441-4463-9B16-F6BE7E4E0527", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:galaxy_watch_3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1F5CDA8B-A7C2-40B7-85AC-EDD147002D11", "versionEndExcluding": "5.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:galaxy_watch_3:-:*:*:*:*:*:*:*", "matchCriteriaId": "E06E024E-72D6-41A0-A780-408C12008CFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_s3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1470254A-C484-4039-A69B-FA2D918764DB", "versionEndExcluding": "5.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_s3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB6F5890-C7A5-45B2-BADE-118B53BE2667", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_s2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "97204E57-9899-4CEB-9E6F-9479A2CB831C", "versionEndExcluding": "5.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_s2:-:*:*:*:*:*:*:*", "matchCriteriaId": "80E04318-D715-4263-A869-C9203EB7CE75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AAA73BF3-0560-447C-95CC-D04718BEE158", "versionEndExcluding": "5.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_s:-:*:*:*:*:*:*:*", "matchCriteriaId": "15C8050C-4FFB-4CE9-AC2E-927C43D0A5ED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7413DA6A-0A6F-4BDE-80A3-EBD4B9B2FBE3", "versionEndExcluding": "5.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_2:-:*:*:*:*:*:*:*", "matchCriteriaId": "A58D5FF1-9573-4059-9C38-4C6B45812896", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_2_neo_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "385D6A09-9D98-4A97-AAAC-FB599B18B1CE", "versionEndExcluding": "5.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_2_neo:-:*:*:*:*:*:*:*", "matchCriteriaId": "18433CF4-99AC-4925-8E96-20AF0910507F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper authentication vulnerability in Tizen bluetooth-frwk prior to Firmware update JUN-2021 Release allows bluetooth attacker to take over the user\u0027s bluetooth device without user awareness." }, { "lang": "es", "value": "Una vulnerabilidad de autenticaci\u00f3n inapropiada en Tizen bluetooth-frwk anterior a la Actualizaci\u00f3n de Firmware JUN-2021, permite a un atacante tomar el control del dispositivo bluetooth del usuario sin que \u00e9ste lo sepa" } ], "id": "CVE-2021-25424", "lastModified": "2024-11-21T05:54:57.680", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-06-11T15:15:10.963", "references": [ { "source": "mobile.security@samsung.com", "tags": [ "Vendor Advisory" ], "url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2021\u0026month=6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2021\u0026month=6" } ], "sourceIdentifier": "mobile.security@samsung.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "mobile.security@samsung.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-01-22 13:15
Modified
2024-11-21 03:52
Severity ?
Summary
The wnoti system service in Samsung Galaxy Gear series allows an unprivileged process to take over the internal notification message data, due to improper D-Bus security policy configurations. This affects Tizen-based firmwares including Samsung Galaxy Gear series before build RE2.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
samsung | galaxy_gear_firmware | * | |
samsung | galaxy_gear | - | |
samsung | gear_2_firmware | * | |
samsung | gear_2 | - | |
samsung | gear_live_firmware | * | |
samsung | gear_live | - | |
samsung | gear_s_firmware | * | |
samsung | gear_s | - | |
samsung | gear_s2_firmware | * | |
samsung | gear_s2 | - | |
samsung | gear_s3_firmware | * | |
samsung | gear_s3 | - | |
samsung | gear_sport_firmware | * | |
samsung | gear_sport | - | |
samsung | gear_fit_firmware | * | |
samsung | gear_fit | - | |
samsung | gear_fit_2_firmware | * | |
samsung | gear_fit_2 | - | |
samsung | gear_fit_2_pro_firmware | * | |
samsung | gear_fit_2_pro | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:galaxy_gear_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "823D208B-3316-42CD-BFAD-F680B2CE04CA", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:galaxy_gear:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B033BF3-3C56-4B7A-92B5-8D1024EB36EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3ACF61B2-D169-4423-9A54-BA0C73BAAA95", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_2:-:*:*:*:*:*:*:*", "matchCriteriaId": "A58D5FF1-9573-4059-9C38-4C6B45812896", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_live_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "94B31103-12C7-460E-B0F0-86D1B036D067", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_live:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1E260EE-D0E5-4506-862E-367D72767A5B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "42163099-D8E7-4509-A9B0-ABCA3260E963", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_s:-:*:*:*:*:*:*:*", "matchCriteriaId": "15C8050C-4FFB-4CE9-AC2E-927C43D0A5ED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_s2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "77C40433-B8BC-4829-B7C5-2EEA66C7827F", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_s2:-:*:*:*:*:*:*:*", "matchCriteriaId": "80E04318-D715-4263-A869-C9203EB7CE75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_s3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A52BB0AA-9EFC-4CC8-AD81-777D63C8E26B", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_s3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB6F5890-C7A5-45B2-BADE-118B53BE2667", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_sport_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "062AEA64-280B-4A80-9E9F-A65225D7A7E9", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_sport:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4D21008-B7FC-4E40-8817-B96A045DB122", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_fit_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F03DF2D-7C51-4633-918E-58B0A5601954", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_fit:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BA573D2-AF1C-4763-9244-95F5104177E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_fit_2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "826565B1-E201-4EF4-B9FD-6D34962188F2", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_fit_2:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A2D9849-D057-41ED-AA8A-D692135B4DC2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_fit_2_pro_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "73864A48-39CC-4196-B18C-AB079D554709", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_fit_2_pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "49E06C7B-5870-4D08-8D48-43EC469A579B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The wnoti system service in Samsung Galaxy Gear series allows an unprivileged process to take over the internal notification message data, due to improper D-Bus security policy configurations. This affects Tizen-based firmwares including Samsung Galaxy Gear series before build RE2." }, { "lang": "es", "value": "El servicio de sistema wnoti en la serie Samsung Galaxy Gear, permite a un proceso no privilegiado tomar el control de los datos del mensaje de notificaci\u00f3n interna, debido a configuraciones de pol\u00edtica de seguridad D-Bus inapropiadas. Esto afecta a los firmwares que se basan ??en Tizen, incluyendo la serie Samsung Galaxy Gear versiones anteriores al build RE2." } ], "id": "CVE-2018-16269", "lastModified": "2024-11-21T03:52:25.467", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-01-22T13:15:10.613", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-01-22 14:15
Modified
2024-11-21 03:52
Severity ?
Summary
The wemail_consumer_service (from the built-in application wemail) in Samsung Galaxy Gear series allows an unprivileged process to manipulate a user's mailbox, due to improper D-Bus security policy configurations. An arbitrary email can also be sent from the mailbox via the paired smartphone. This affects Tizen-based firmwares including Samsung Galaxy Gear series before build RE2.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
samsung | galaxy_gear_firmware | * | |
samsung | galaxy_gear | - | |
samsung | gear_2_firmware | * | |
samsung | gear_2 | - | |
samsung | gear_live_firmware | * | |
samsung | gear_live | - | |
samsung | gear_s_firmware | * | |
samsung | gear_s | - | |
samsung | gear_s2_firmware | * | |
samsung | gear_s2 | - | |
samsung | gear_s3_firmware | * | |
samsung | gear_s3 | - | |
samsung | gear_sport_firmware | * | |
samsung | gear_sport | - | |
samsung | gear_fit_firmware | * | |
samsung | gear_fit | - | |
samsung | gear_fit_2_firmware | * | |
samsung | gear_fit_2 | - | |
samsung | gear_fit_2_pro_firmware | * | |
samsung | gear_fit_2_pro | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:galaxy_gear_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "823D208B-3316-42CD-BFAD-F680B2CE04CA", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:galaxy_gear:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B033BF3-3C56-4B7A-92B5-8D1024EB36EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3ACF61B2-D169-4423-9A54-BA0C73BAAA95", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_2:-:*:*:*:*:*:*:*", "matchCriteriaId": "A58D5FF1-9573-4059-9C38-4C6B45812896", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_live_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "94B31103-12C7-460E-B0F0-86D1B036D067", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_live:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1E260EE-D0E5-4506-862E-367D72767A5B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "42163099-D8E7-4509-A9B0-ABCA3260E963", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_s:-:*:*:*:*:*:*:*", "matchCriteriaId": "15C8050C-4FFB-4CE9-AC2E-927C43D0A5ED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_s2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "77C40433-B8BC-4829-B7C5-2EEA66C7827F", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_s2:-:*:*:*:*:*:*:*", "matchCriteriaId": "80E04318-D715-4263-A869-C9203EB7CE75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_s3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A52BB0AA-9EFC-4CC8-AD81-777D63C8E26B", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_s3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB6F5890-C7A5-45B2-BADE-118B53BE2667", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_sport_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "062AEA64-280B-4A80-9E9F-A65225D7A7E9", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_sport:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4D21008-B7FC-4E40-8817-B96A045DB122", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_fit_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F03DF2D-7C51-4633-918E-58B0A5601954", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_fit:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BA573D2-AF1C-4763-9244-95F5104177E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_fit_2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "826565B1-E201-4EF4-B9FD-6D34962188F2", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_fit_2:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A2D9849-D057-41ED-AA8A-D692135B4DC2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_fit_2_pro_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "73864A48-39CC-4196-B18C-AB079D554709", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_fit_2_pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "49E06C7B-5870-4D08-8D48-43EC469A579B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The wemail_consumer_service (from the built-in application wemail) in Samsung Galaxy Gear series allows an unprivileged process to manipulate a user\u0027s mailbox, due to improper D-Bus security policy configurations. An arbitrary email can also be sent from the mailbox via the paired smartphone. This affects Tizen-based firmwares including Samsung Galaxy Gear series before build RE2." }, { "lang": "es", "value": "El servicio wemail_consumer_service (de la aplicaci\u00f3n wemail incorporada) en la serie Samsung Galaxy Gear, permite a un proceso no privilegiado manipular el buz\u00f3n de un usuario, debido a configuraciones de pol\u00edtica de seguridad D-Bus inapropiadas. Un correo electr\u00f3nico arbitrario tambi\u00e9n puede ser enviado desde el buz\u00f3n mediante el tel\u00e9fono inteligente emparejado. Esto afecta a los firmwares que se basan ??en Tizen, incluyendo la serie Samsung Galaxy Gear versiones anteriores al build RE2." } ], "id": "CVE-2018-16271", "lastModified": "2024-11-21T03:52:25.797", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-01-22T14:15:11.277", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2021-25424 (GCVE-0-2021-25424)
Vulnerability from cvelistv5
Published
2021-06-11 14:33
Modified
2024-08-03 20:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-287 - Improper Authentication
Summary
Improper authentication vulnerability in Tizen bluetooth-frwk prior to Firmware update JUN-2021 Release allows bluetooth attacker to take over the user's bluetooth device without user awareness.
References
▼ | URL | Tags |
---|---|---|
https://security.samsungmobile.com/serviceWeb.smsb?year=2021&month=6 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Samsung Mobile | Tizen wearable devices |
Version: 5.5 < Firmware update JUN-2021 Release |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:03:05.579Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2021\u0026month=6" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Tizen wearable devices", "vendor": "Samsung Mobile", "versions": [ { "lessThan": "Firmware update JUN-2021 Release ", "status": "affected", "version": "5.5", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper authentication vulnerability in Tizen bluetooth-frwk prior to Firmware update JUN-2021 Release allows bluetooth attacker to take over the user\u0027s bluetooth device without user awareness." } ], "metrics": [ { "other": { "content": { "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, "type": "unknown" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287: Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-11T14:33:46", "orgId": "3af57064-a867-422c-b2ad-40307b65c458", "shortName": "Samsung Mobile" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2021\u0026month=6" } ], "source": { "discovery": "UNKNOWN" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "mobile.security@samsung.com", "ID": "CVE-2021-25424", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Tizen wearable devices", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "5.5", "version_value": "Firmware update JUN-2021 Release " } ] } } ] }, "vendor_name": "Samsung Mobile" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper authentication vulnerability in Tizen bluetooth-frwk prior to Firmware update JUN-2021 Release allows bluetooth attacker to take over the user\u0027s bluetooth device without user awareness." } ] }, "impact": { "cvss": { "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-287: Improper Authentication" } ] } ] }, "references": { "reference_data": [ { "name": "https://security.samsungmobile.com/serviceWeb.smsb?year=2021\u0026month=6", "refsource": "MISC", "url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2021\u0026month=6" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "3af57064-a867-422c-b2ad-40307b65c458", "assignerShortName": "Samsung Mobile", "cveId": "CVE-2021-25424", "datePublished": "2021-06-11T14:33:46", "dateReserved": "2021-01-19T00:00:00", "dateUpdated": "2024-08-03T20:03:05.579Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-16269 (GCVE-0-2018-16269)
Vulnerability from cvelistv5
Published
2020-01-22 12:59
Modified
2024-08-05 10:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The wnoti system service in Samsung Galaxy Gear series allows an unprivileged process to take over the internal notification message data, due to improper D-Bus security policy configurations. This affects Tizen-based firmwares including Samsung Galaxy Gear series before build RE2.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:17:38.409Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The wnoti system service in Samsung Galaxy Gear series allows an unprivileged process to take over the internal notification message data, due to improper D-Bus security policy configurations. This affects Tizen-based firmwares including Samsung Galaxy Gear series before build RE2." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-01-22T12:59:55", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-16269", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The wnoti system service in Samsung Galaxy Gear series allows an unprivileged process to take over the internal notification message data, due to improper D-Bus security policy configurations. This affects Tizen-based firmwares including Samsung Galaxy Gear series before build RE2." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf", "refsource": "MISC", "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf" }, { "name": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be", "refsource": "MISC", "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-16269", "datePublished": "2020-01-22T12:59:55", "dateReserved": "2018-08-31T00:00:00", "dateUpdated": "2024-08-05T10:17:38.409Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-16270 (GCVE-0-2018-16270)
Vulnerability from cvelistv5
Published
2020-01-22 13:01
Modified
2024-08-05 10:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Samsung Galaxy Gear series before build RE2 includes the hcidump utility with no privilege or permission restriction. This allows an unprivileged process to dump Bluetooth HCI packets to an arbitrary file path.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:17:38.305Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Samsung Galaxy Gear series before build RE2 includes the hcidump utility with no privilege or permission restriction. This allows an unprivileged process to dump Bluetooth HCI packets to an arbitrary file path." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-01-22T13:01:28", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-16270", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Samsung Galaxy Gear series before build RE2 includes the hcidump utility with no privilege or permission restriction. This allows an unprivileged process to dump Bluetooth HCI packets to an arbitrary file path." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf", "refsource": "MISC", "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf" }, { "name": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be", "refsource": "MISC", "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-16270", "datePublished": "2020-01-22T13:01:29", "dateReserved": "2018-08-31T00:00:00", "dateUpdated": "2024-08-05T10:17:38.305Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-16272 (GCVE-0-2018-16272)
Vulnerability from cvelistv5
Published
2020-01-22 13:04
Modified
2024-08-05 10:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The wpa_supplicant system service in Samsung Galaxy Gear series allows an unprivileged process to fully control the Wi-Fi interface, due to the lack of its D-Bus security policy configurations. This affects Tizen-based firmwares including Samsung Galaxy Gear series before build RE2.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:17:38.460Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The wpa_supplicant system service in Samsung Galaxy Gear series allows an unprivileged process to fully control the Wi-Fi interface, due to the lack of its D-Bus security policy configurations. This affects Tizen-based firmwares including Samsung Galaxy Gear series before build RE2." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-01-22T13:04:37", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-16272", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The wpa_supplicant system service in Samsung Galaxy Gear series allows an unprivileged process to fully control the Wi-Fi interface, due to the lack of its D-Bus security policy configurations. This affects Tizen-based firmwares including Samsung Galaxy Gear series before build RE2." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf", "refsource": "MISC", "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf" }, { "name": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be", "refsource": "MISC", "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-16272", "datePublished": "2020-01-22T13:04:37", "dateReserved": "2018-08-31T00:00:00", "dateUpdated": "2024-08-05T10:17:38.460Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-16271 (GCVE-0-2018-16271)
Vulnerability from cvelistv5
Published
2020-01-22 13:03
Modified
2024-08-05 10:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The wemail_consumer_service (from the built-in application wemail) in Samsung Galaxy Gear series allows an unprivileged process to manipulate a user's mailbox, due to improper D-Bus security policy configurations. An arbitrary email can also be sent from the mailbox via the paired smartphone. This affects Tizen-based firmwares including Samsung Galaxy Gear series before build RE2.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:17:38.462Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The wemail_consumer_service (from the built-in application wemail) in Samsung Galaxy Gear series allows an unprivileged process to manipulate a user\u0027s mailbox, due to improper D-Bus security policy configurations. An arbitrary email can also be sent from the mailbox via the paired smartphone. This affects Tizen-based firmwares including Samsung Galaxy Gear series before build RE2." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-01-22T13:03:26", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-16271", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The wemail_consumer_service (from the built-in application wemail) in Samsung Galaxy Gear series allows an unprivileged process to manipulate a user\u0027s mailbox, due to improper D-Bus security policy configurations. An arbitrary email can also be sent from the mailbox via the paired smartphone. This affects Tizen-based firmwares including Samsung Galaxy Gear series before build RE2." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf", "refsource": "MISC", "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf" }, { "name": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be", "refsource": "MISC", "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-16271", "datePublished": "2020-01-22T13:03:26", "dateReserved": "2018-08-31T00:00:00", "dateUpdated": "2024-08-05T10:17:38.462Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }