Vulnerabilites related to samsung - gear_s3
Vulnerability from fkie_nvd
Published
2020-01-22 14:15
Modified
2024-11-21 03:52
Severity ?
Summary
The wpa_supplicant system service in Samsung Galaxy Gear series allows an unprivileged process to fully control the Wi-Fi interface, due to the lack of its D-Bus security policy configurations. This affects Tizen-based firmwares including Samsung Galaxy Gear series before build RE2.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
samsung | galaxy_gear_firmware | * | |
samsung | galaxy_gear | - | |
samsung | gear_2_firmware | * | |
samsung | gear_2 | - | |
samsung | gear_live_firmware | * | |
samsung | gear_live | - | |
samsung | gear_s_firmware | * | |
samsung | gear_s | - | |
samsung | gear_s2_firmware | * | |
samsung | gear_s2 | - | |
samsung | gear_s3_firmware | * | |
samsung | gear_s3 | - | |
samsung | gear_sport_firmware | * | |
samsung | gear_sport | - | |
samsung | gear_fit_firmware | * | |
samsung | gear_fit | - | |
samsung | gear_fit_2_firmware | * | |
samsung | gear_fit_2 | - | |
samsung | gear_fit_2_pro_firmware | * | |
samsung | gear_fit_2_pro | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:galaxy_gear_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "823D208B-3316-42CD-BFAD-F680B2CE04CA", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:galaxy_gear:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B033BF3-3C56-4B7A-92B5-8D1024EB36EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3ACF61B2-D169-4423-9A54-BA0C73BAAA95", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_2:-:*:*:*:*:*:*:*", "matchCriteriaId": "A58D5FF1-9573-4059-9C38-4C6B45812896", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_live_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "94B31103-12C7-460E-B0F0-86D1B036D067", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_live:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1E260EE-D0E5-4506-862E-367D72767A5B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "42163099-D8E7-4509-A9B0-ABCA3260E963", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_s:-:*:*:*:*:*:*:*", "matchCriteriaId": "15C8050C-4FFB-4CE9-AC2E-927C43D0A5ED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_s2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "77C40433-B8BC-4829-B7C5-2EEA66C7827F", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_s2:-:*:*:*:*:*:*:*", "matchCriteriaId": "80E04318-D715-4263-A869-C9203EB7CE75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_s3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A52BB0AA-9EFC-4CC8-AD81-777D63C8E26B", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_s3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB6F5890-C7A5-45B2-BADE-118B53BE2667", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_sport_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "062AEA64-280B-4A80-9E9F-A65225D7A7E9", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_sport:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4D21008-B7FC-4E40-8817-B96A045DB122", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_fit_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F03DF2D-7C51-4633-918E-58B0A5601954", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_fit:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BA573D2-AF1C-4763-9244-95F5104177E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_fit_2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "826565B1-E201-4EF4-B9FD-6D34962188F2", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_fit_2:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A2D9849-D057-41ED-AA8A-D692135B4DC2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_fit_2_pro_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "73864A48-39CC-4196-B18C-AB079D554709", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_fit_2_pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "49E06C7B-5870-4D08-8D48-43EC469A579B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The wpa_supplicant system service in Samsung Galaxy Gear series allows an unprivileged process to fully control the Wi-Fi interface, due to the lack of its D-Bus security policy configurations. This affects Tizen-based firmwares including Samsung Galaxy Gear series before build RE2." }, { "lang": "es", "value": "El servicio de sistema wpa_supplicant en la serie Samsung Galaxy Gear, permite a un proceso no privilegiado controlar completamente la interfaz Wi-Fi, debido a la falta de sus configuraciones de pol\u00edtica de seguridad D-Bus. Esto afecta a los firmwares que se basan ??en Tizen, incluyendo la serie Samsung Galaxy Gear versiones anteriores al build RE2." } ], "id": "CVE-2018-16272", "lastModified": "2024-11-21T03:52:25.960", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-01-22T14:15:11.337", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-01-22 14:15
Modified
2024-11-21 03:52
Severity ?
Summary
Samsung Galaxy Gear series before build RE2 includes the hcidump utility with no privilege or permission restriction. This allows an unprivileged process to dump Bluetooth HCI packets to an arbitrary file path.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
samsung | galaxy_gear_firmware | * | |
samsung | galaxy_gear | - | |
samsung | gear_2_firmware | * | |
samsung | gear_2 | - | |
samsung | gear_live_firmware | * | |
samsung | gear_live | - | |
samsung | gear_s_firmware | * | |
samsung | gear_s | - | |
samsung | gear_s2_firmware | * | |
samsung | gear_s2 | - | |
samsung | gear_s3_firmware | * | |
samsung | gear_s3 | - | |
samsung | gear_sport_firmware | * | |
samsung | gear_sport | - | |
samsung | gear_fit_firmware | * | |
samsung | gear_fit | - | |
samsung | gear_fit_2_firmware | * | |
samsung | gear_fit_2 | - | |
samsung | gear_fit_2_pro_firmware | * | |
samsung | gear_fit_2_pro | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:galaxy_gear_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "823D208B-3316-42CD-BFAD-F680B2CE04CA", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:galaxy_gear:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B033BF3-3C56-4B7A-92B5-8D1024EB36EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3ACF61B2-D169-4423-9A54-BA0C73BAAA95", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_2:-:*:*:*:*:*:*:*", "matchCriteriaId": "A58D5FF1-9573-4059-9C38-4C6B45812896", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_live_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "94B31103-12C7-460E-B0F0-86D1B036D067", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_live:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1E260EE-D0E5-4506-862E-367D72767A5B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "42163099-D8E7-4509-A9B0-ABCA3260E963", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_s:-:*:*:*:*:*:*:*", "matchCriteriaId": "15C8050C-4FFB-4CE9-AC2E-927C43D0A5ED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_s2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "77C40433-B8BC-4829-B7C5-2EEA66C7827F", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_s2:-:*:*:*:*:*:*:*", "matchCriteriaId": "80E04318-D715-4263-A869-C9203EB7CE75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_s3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A52BB0AA-9EFC-4CC8-AD81-777D63C8E26B", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_s3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB6F5890-C7A5-45B2-BADE-118B53BE2667", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_sport_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "062AEA64-280B-4A80-9E9F-A65225D7A7E9", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_sport:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4D21008-B7FC-4E40-8817-B96A045DB122", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_fit_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F03DF2D-7C51-4633-918E-58B0A5601954", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_fit:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BA573D2-AF1C-4763-9244-95F5104177E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_fit_2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "826565B1-E201-4EF4-B9FD-6D34962188F2", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_fit_2:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A2D9849-D057-41ED-AA8A-D692135B4DC2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_fit_2_pro_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "73864A48-39CC-4196-B18C-AB079D554709", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_fit_2_pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "49E06C7B-5870-4D08-8D48-43EC469A579B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Samsung Galaxy Gear series before build RE2 includes the hcidump utility with no privilege or permission restriction. This allows an unprivileged process to dump Bluetooth HCI packets to an arbitrary file path." }, { "lang": "es", "value": "La serie Samsung Galaxy Gear versiones anteriores al build RE2, incluye la utilidad hcidump sin restricci\u00f3n de privilegios o permisos. Esto permite a un proceso no privilegiado descargar paquetes Bluetooth HCI en una ruta de archivo arbitraria." } ], "id": "CVE-2018-16270", "lastModified": "2024-11-21T03:52:25.633", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-01-22T14:15:11.213", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-06-11 15:15
Modified
2024-11-21 05:54
Severity ?
Summary
Improper authentication vulnerability in Tizen bluetooth-frwk prior to Firmware update JUN-2021 Release allows bluetooth attacker to take over the user's bluetooth device without user awareness.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:galaxy_watch_active_2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "63010A7C-58DC-468C-BA3C-F55098E8DEFB", "versionEndExcluding": "5.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:galaxy_watch_active_2:-:*:*:*:*:*:*:*", "matchCriteriaId": "008A8838-4273-49EA-8ABE-590BE4765EE0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:galaxy_watch_active_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "968977C3-E441-4758-9FD7-E10CA68F095C", "versionEndExcluding": "5.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:galaxy_watch_active:-:*:*:*:*:*:*:*", "matchCriteriaId": "43AC7998-096D-4F7C-90BF-F024DEA68569", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:galaxy_watch_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "57C16DE2-8E1D-4F05-BBA2-931A102AA947", "versionEndExcluding": "5.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:galaxy_watch:-:*:*:*:*:*:*:*", "matchCriteriaId": "978A382D-C441-4463-9B16-F6BE7E4E0527", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:galaxy_watch_3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1F5CDA8B-A7C2-40B7-85AC-EDD147002D11", "versionEndExcluding": "5.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:galaxy_watch_3:-:*:*:*:*:*:*:*", "matchCriteriaId": "E06E024E-72D6-41A0-A780-408C12008CFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_s3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1470254A-C484-4039-A69B-FA2D918764DB", "versionEndExcluding": "5.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_s3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB6F5890-C7A5-45B2-BADE-118B53BE2667", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_s2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "97204E57-9899-4CEB-9E6F-9479A2CB831C", "versionEndExcluding": "5.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_s2:-:*:*:*:*:*:*:*", "matchCriteriaId": "80E04318-D715-4263-A869-C9203EB7CE75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AAA73BF3-0560-447C-95CC-D04718BEE158", "versionEndExcluding": "5.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_s:-:*:*:*:*:*:*:*", "matchCriteriaId": "15C8050C-4FFB-4CE9-AC2E-927C43D0A5ED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7413DA6A-0A6F-4BDE-80A3-EBD4B9B2FBE3", "versionEndExcluding": "5.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_2:-:*:*:*:*:*:*:*", "matchCriteriaId": "A58D5FF1-9573-4059-9C38-4C6B45812896", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_2_neo_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "385D6A09-9D98-4A97-AAAC-FB599B18B1CE", "versionEndExcluding": "5.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_2_neo:-:*:*:*:*:*:*:*", "matchCriteriaId": "18433CF4-99AC-4925-8E96-20AF0910507F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper authentication vulnerability in Tizen bluetooth-frwk prior to Firmware update JUN-2021 Release allows bluetooth attacker to take over the user\u0027s bluetooth device without user awareness." }, { "lang": "es", "value": "Una vulnerabilidad de autenticaci\u00f3n inapropiada en Tizen bluetooth-frwk anterior a la Actualizaci\u00f3n de Firmware JUN-2021, permite a un atacante tomar el control del dispositivo bluetooth del usuario sin que \u00e9ste lo sepa" } ], "id": "CVE-2021-25424", "lastModified": "2024-11-21T05:54:57.680", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-06-11T15:15:10.963", "references": [ { "source": "mobile.security@samsung.com", "tags": [ "Vendor Advisory" ], "url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2021\u0026month=6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2021\u0026month=6" } ], "sourceIdentifier": "mobile.security@samsung.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "mobile.security@samsung.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-01-22 13:15
Modified
2024-11-21 03:52
Severity ?
Summary
The wnoti system service in Samsung Galaxy Gear series allows an unprivileged process to take over the internal notification message data, due to improper D-Bus security policy configurations. This affects Tizen-based firmwares including Samsung Galaxy Gear series before build RE2.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
samsung | galaxy_gear_firmware | * | |
samsung | galaxy_gear | - | |
samsung | gear_2_firmware | * | |
samsung | gear_2 | - | |
samsung | gear_live_firmware | * | |
samsung | gear_live | - | |
samsung | gear_s_firmware | * | |
samsung | gear_s | - | |
samsung | gear_s2_firmware | * | |
samsung | gear_s2 | - | |
samsung | gear_s3_firmware | * | |
samsung | gear_s3 | - | |
samsung | gear_sport_firmware | * | |
samsung | gear_sport | - | |
samsung | gear_fit_firmware | * | |
samsung | gear_fit | - | |
samsung | gear_fit_2_firmware | * | |
samsung | gear_fit_2 | - | |
samsung | gear_fit_2_pro_firmware | * | |
samsung | gear_fit_2_pro | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:galaxy_gear_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "823D208B-3316-42CD-BFAD-F680B2CE04CA", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:galaxy_gear:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B033BF3-3C56-4B7A-92B5-8D1024EB36EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3ACF61B2-D169-4423-9A54-BA0C73BAAA95", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_2:-:*:*:*:*:*:*:*", "matchCriteriaId": "A58D5FF1-9573-4059-9C38-4C6B45812896", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_live_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "94B31103-12C7-460E-B0F0-86D1B036D067", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_live:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1E260EE-D0E5-4506-862E-367D72767A5B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "42163099-D8E7-4509-A9B0-ABCA3260E963", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_s:-:*:*:*:*:*:*:*", "matchCriteriaId": "15C8050C-4FFB-4CE9-AC2E-927C43D0A5ED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_s2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "77C40433-B8BC-4829-B7C5-2EEA66C7827F", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_s2:-:*:*:*:*:*:*:*", "matchCriteriaId": "80E04318-D715-4263-A869-C9203EB7CE75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_s3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A52BB0AA-9EFC-4CC8-AD81-777D63C8E26B", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_s3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB6F5890-C7A5-45B2-BADE-118B53BE2667", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_sport_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "062AEA64-280B-4A80-9E9F-A65225D7A7E9", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_sport:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4D21008-B7FC-4E40-8817-B96A045DB122", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_fit_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F03DF2D-7C51-4633-918E-58B0A5601954", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_fit:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BA573D2-AF1C-4763-9244-95F5104177E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_fit_2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "826565B1-E201-4EF4-B9FD-6D34962188F2", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_fit_2:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A2D9849-D057-41ED-AA8A-D692135B4DC2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_fit_2_pro_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "73864A48-39CC-4196-B18C-AB079D554709", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_fit_2_pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "49E06C7B-5870-4D08-8D48-43EC469A579B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The wnoti system service in Samsung Galaxy Gear series allows an unprivileged process to take over the internal notification message data, due to improper D-Bus security policy configurations. This affects Tizen-based firmwares including Samsung Galaxy Gear series before build RE2." }, { "lang": "es", "value": "El servicio de sistema wnoti en la serie Samsung Galaxy Gear, permite a un proceso no privilegiado tomar el control de los datos del mensaje de notificaci\u00f3n interna, debido a configuraciones de pol\u00edtica de seguridad D-Bus inapropiadas. Esto afecta a los firmwares que se basan ??en Tizen, incluyendo la serie Samsung Galaxy Gear versiones anteriores al build RE2." } ], "id": "CVE-2018-16269", "lastModified": "2024-11-21T03:52:25.467", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-01-22T13:15:10.613", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-01-18 22:29
Modified
2024-11-21 03:18
Severity ?
Summary
In Samsung Gear products, Bluetooth link key is updated to the different key which is same with attacker's link key. It can be attacked without user's intention only if attacker can reveal the Bluetooth address of target device and paired user's smartphone
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://drive.google.com/open?id=0B5L-0MoH_v7fcGljUS1SYnlkOHM | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://drive.google.com/open?id=0B5L-0MoH_v7fcGljUS1SYnlkOHM | Exploit, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_s2:-:*:*:*:*:*:*:*", "matchCriteriaId": "80E04318-D715-4263-A869-C9203EB7CE75", "vulnerable": false }, { "criteria": "cpe:2.3:h:samsung:gear_s3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB6F5890-C7A5-45B2-BADE-118B53BE2667", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Samsung Gear products, Bluetooth link key is updated to the different key which is same with attacker\u0027s link key. It can be attacked without user\u0027s intention only if attacker can reveal the Bluetooth address of target device and paired user\u0027s smartphone" }, { "lang": "es", "value": "En productos Samsung Gear, la clave de enlace Bluetooth se actualiza en la clave diferente, que es igual a la clave de enlace del atacante. Puede atacarse sin la intenci\u00f3n del usuario solo si el atacante puede revelar la direcci\u00f3n Bluetooth del dispositivo objetivo y el smartphone emparejado del usuario." } ], "id": "CVE-2017-17860", "lastModified": "2024-11-21T03:18:50.310", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 5.7, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 5.5, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 2.1, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-01-18T22:29:00.233", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://drive.google.com/open?id=0B5L-0MoH_v7fcGljUS1SYnlkOHM" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://drive.google.com/open?id=0B5L-0MoH_v7fcGljUS1SYnlkOHM" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-01-22 14:15
Modified
2024-11-21 03:52
Severity ?
Summary
The wemail_consumer_service (from the built-in application wemail) in Samsung Galaxy Gear series allows an unprivileged process to manipulate a user's mailbox, due to improper D-Bus security policy configurations. An arbitrary email can also be sent from the mailbox via the paired smartphone. This affects Tizen-based firmwares including Samsung Galaxy Gear series before build RE2.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
samsung | galaxy_gear_firmware | * | |
samsung | galaxy_gear | - | |
samsung | gear_2_firmware | * | |
samsung | gear_2 | - | |
samsung | gear_live_firmware | * | |
samsung | gear_live | - | |
samsung | gear_s_firmware | * | |
samsung | gear_s | - | |
samsung | gear_s2_firmware | * | |
samsung | gear_s2 | - | |
samsung | gear_s3_firmware | * | |
samsung | gear_s3 | - | |
samsung | gear_sport_firmware | * | |
samsung | gear_sport | - | |
samsung | gear_fit_firmware | * | |
samsung | gear_fit | - | |
samsung | gear_fit_2_firmware | * | |
samsung | gear_fit_2 | - | |
samsung | gear_fit_2_pro_firmware | * | |
samsung | gear_fit_2_pro | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:galaxy_gear_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "823D208B-3316-42CD-BFAD-F680B2CE04CA", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:galaxy_gear:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B033BF3-3C56-4B7A-92B5-8D1024EB36EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3ACF61B2-D169-4423-9A54-BA0C73BAAA95", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_2:-:*:*:*:*:*:*:*", "matchCriteriaId": "A58D5FF1-9573-4059-9C38-4C6B45812896", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_live_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "94B31103-12C7-460E-B0F0-86D1B036D067", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_live:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1E260EE-D0E5-4506-862E-367D72767A5B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "42163099-D8E7-4509-A9B0-ABCA3260E963", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_s:-:*:*:*:*:*:*:*", "matchCriteriaId": "15C8050C-4FFB-4CE9-AC2E-927C43D0A5ED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_s2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "77C40433-B8BC-4829-B7C5-2EEA66C7827F", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_s2:-:*:*:*:*:*:*:*", "matchCriteriaId": "80E04318-D715-4263-A869-C9203EB7CE75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_s3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A52BB0AA-9EFC-4CC8-AD81-777D63C8E26B", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_s3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB6F5890-C7A5-45B2-BADE-118B53BE2667", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_sport_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "062AEA64-280B-4A80-9E9F-A65225D7A7E9", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_sport:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4D21008-B7FC-4E40-8817-B96A045DB122", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_fit_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F03DF2D-7C51-4633-918E-58B0A5601954", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_fit:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BA573D2-AF1C-4763-9244-95F5104177E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_fit_2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "826565B1-E201-4EF4-B9FD-6D34962188F2", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_fit_2:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A2D9849-D057-41ED-AA8A-D692135B4DC2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:gear_fit_2_pro_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "73864A48-39CC-4196-B18C-AB079D554709", "versionEndExcluding": "re2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:gear_fit_2_pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "49E06C7B-5870-4D08-8D48-43EC469A579B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The wemail_consumer_service (from the built-in application wemail) in Samsung Galaxy Gear series allows an unprivileged process to manipulate a user\u0027s mailbox, due to improper D-Bus security policy configurations. An arbitrary email can also be sent from the mailbox via the paired smartphone. This affects Tizen-based firmwares including Samsung Galaxy Gear series before build RE2." }, { "lang": "es", "value": "El servicio wemail_consumer_service (de la aplicaci\u00f3n wemail incorporada) en la serie Samsung Galaxy Gear, permite a un proceso no privilegiado manipular el buz\u00f3n de un usuario, debido a configuraciones de pol\u00edtica de seguridad D-Bus inapropiadas. Un correo electr\u00f3nico arbitrario tambi\u00e9n puede ser enviado desde el buz\u00f3n mediante el tel\u00e9fono inteligente emparejado. Esto afecta a los firmwares que se basan ??en Tizen, incluyendo la serie Samsung Galaxy Gear versiones anteriores al build RE2." } ], "id": "CVE-2018-16271", "lastModified": "2024-11-21T03:52:25.797", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-01-22T14:15:11.277", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2021-25424 (GCVE-0-2021-25424)
Vulnerability from cvelistv5
Published
2021-06-11 14:33
Modified
2024-08-03 20:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-287 - Improper Authentication
Summary
Improper authentication vulnerability in Tizen bluetooth-frwk prior to Firmware update JUN-2021 Release allows bluetooth attacker to take over the user's bluetooth device without user awareness.
References
▼ | URL | Tags |
---|---|---|
https://security.samsungmobile.com/serviceWeb.smsb?year=2021&month=6 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Samsung Mobile | Tizen wearable devices |
Version: 5.5 < Firmware update JUN-2021 Release |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:03:05.579Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2021\u0026month=6" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Tizen wearable devices", "vendor": "Samsung Mobile", "versions": [ { "lessThan": "Firmware update JUN-2021 Release ", "status": "affected", "version": "5.5", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper authentication vulnerability in Tizen bluetooth-frwk prior to Firmware update JUN-2021 Release allows bluetooth attacker to take over the user\u0027s bluetooth device without user awareness." } ], "metrics": [ { "other": { "content": { "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, "type": "unknown" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287: Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-11T14:33:46", "orgId": "3af57064-a867-422c-b2ad-40307b65c458", "shortName": "Samsung Mobile" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2021\u0026month=6" } ], "source": { "discovery": "UNKNOWN" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "mobile.security@samsung.com", "ID": "CVE-2021-25424", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Tizen wearable devices", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "5.5", "version_value": "Firmware update JUN-2021 Release " } ] } } ] }, "vendor_name": "Samsung Mobile" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper authentication vulnerability in Tizen bluetooth-frwk prior to Firmware update JUN-2021 Release allows bluetooth attacker to take over the user\u0027s bluetooth device without user awareness." } ] }, "impact": { "cvss": { "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-287: Improper Authentication" } ] } ] }, "references": { "reference_data": [ { "name": "https://security.samsungmobile.com/serviceWeb.smsb?year=2021\u0026month=6", "refsource": "MISC", "url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2021\u0026month=6" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "3af57064-a867-422c-b2ad-40307b65c458", "assignerShortName": "Samsung Mobile", "cveId": "CVE-2021-25424", "datePublished": "2021-06-11T14:33:46", "dateReserved": "2021-01-19T00:00:00", "dateUpdated": "2024-08-03T20:03:05.579Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-16272 (GCVE-0-2018-16272)
Vulnerability from cvelistv5
Published
2020-01-22 13:04
Modified
2024-08-05 10:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The wpa_supplicant system service in Samsung Galaxy Gear series allows an unprivileged process to fully control the Wi-Fi interface, due to the lack of its D-Bus security policy configurations. This affects Tizen-based firmwares including Samsung Galaxy Gear series before build RE2.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:17:38.460Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The wpa_supplicant system service in Samsung Galaxy Gear series allows an unprivileged process to fully control the Wi-Fi interface, due to the lack of its D-Bus security policy configurations. This affects Tizen-based firmwares including Samsung Galaxy Gear series before build RE2." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-01-22T13:04:37", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-16272", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The wpa_supplicant system service in Samsung Galaxy Gear series allows an unprivileged process to fully control the Wi-Fi interface, due to the lack of its D-Bus security policy configurations. This affects Tizen-based firmwares including Samsung Galaxy Gear series before build RE2." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf", "refsource": "MISC", "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf" }, { "name": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be", "refsource": "MISC", "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-16272", "datePublished": "2020-01-22T13:04:37", "dateReserved": "2018-08-31T00:00:00", "dateUpdated": "2024-08-05T10:17:38.460Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-16269 (GCVE-0-2018-16269)
Vulnerability from cvelistv5
Published
2020-01-22 12:59
Modified
2024-08-05 10:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The wnoti system service in Samsung Galaxy Gear series allows an unprivileged process to take over the internal notification message data, due to improper D-Bus security policy configurations. This affects Tizen-based firmwares including Samsung Galaxy Gear series before build RE2.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:17:38.409Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The wnoti system service in Samsung Galaxy Gear series allows an unprivileged process to take over the internal notification message data, due to improper D-Bus security policy configurations. This affects Tizen-based firmwares including Samsung Galaxy Gear series before build RE2." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-01-22T12:59:55", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-16269", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The wnoti system service in Samsung Galaxy Gear series allows an unprivileged process to take over the internal notification message data, due to improper D-Bus security policy configurations. This affects Tizen-based firmwares including Samsung Galaxy Gear series before build RE2." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf", "refsource": "MISC", "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf" }, { "name": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be", "refsource": "MISC", "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-16269", "datePublished": "2020-01-22T12:59:55", "dateReserved": "2018-08-31T00:00:00", "dateUpdated": "2024-08-05T10:17:38.409Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-16270 (GCVE-0-2018-16270)
Vulnerability from cvelistv5
Published
2020-01-22 13:01
Modified
2024-08-05 10:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Samsung Galaxy Gear series before build RE2 includes the hcidump utility with no privilege or permission restriction. This allows an unprivileged process to dump Bluetooth HCI packets to an arbitrary file path.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:17:38.305Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Samsung Galaxy Gear series before build RE2 includes the hcidump utility with no privilege or permission restriction. This allows an unprivileged process to dump Bluetooth HCI packets to an arbitrary file path." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-01-22T13:01:28", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-16270", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Samsung Galaxy Gear series before build RE2 includes the hcidump utility with no privilege or permission restriction. This allows an unprivileged process to dump Bluetooth HCI packets to an arbitrary file path." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf", "refsource": "MISC", "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf" }, { "name": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be", "refsource": "MISC", "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-16270", "datePublished": "2020-01-22T13:01:29", "dateReserved": "2018-08-31T00:00:00", "dateUpdated": "2024-08-05T10:17:38.305Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-17860 (GCVE-0-2017-17860)
Vulnerability from cvelistv5
Published
2018-01-18 22:00
Modified
2024-09-16 18:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
In Samsung Gear products, Bluetooth link key is updated to the different key which is same with attacker's link key. It can be attacked without user's intention only if attacker can reveal the Bluetooth address of target device and paired user's smartphone
References
▼ | URL | Tags |
---|---|---|
https://drive.google.com/open?id=0B5L-0MoH_v7fcGljUS1SYnlkOHM | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T21:06:49.000Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://drive.google.com/open?id=0B5L-0MoH_v7fcGljUS1SYnlkOHM" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-01-16T00:00:00", "descriptions": [ { "lang": "en", "value": "In Samsung Gear products, Bluetooth link key is updated to the different key which is same with attacker\u0027s link key. It can be attacked without user\u0027s intention only if attacker can reveal the Bluetooth address of target device and paired user\u0027s smartphone" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-19T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://drive.google.com/open?id=0B5L-0MoH_v7fcGljUS1SYnlkOHM" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "DATE_PUBLIC": "2018-01-16T00:00:00", "ID": "CVE-2017-17860", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Samsung Gear products, Bluetooth link key is updated to the different key which is same with attacker\u0027s link key. It can be attacked without user\u0027s intention only if attacker can reveal the Bluetooth address of target device and paired user\u0027s smartphone" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://drive.google.com/open?id=0B5L-0MoH_v7fcGljUS1SYnlkOHM", "refsource": "MISC", "url": "https://drive.google.com/open?id=0B5L-0MoH_v7fcGljUS1SYnlkOHM" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-17860", "datePublished": "2018-01-18T22:00:00Z", "dateReserved": "2017-12-23T00:00:00", "dateUpdated": "2024-09-16T18:56:05.479Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-16271 (GCVE-0-2018-16271)
Vulnerability from cvelistv5
Published
2020-01-22 13:03
Modified
2024-08-05 10:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The wemail_consumer_service (from the built-in application wemail) in Samsung Galaxy Gear series allows an unprivileged process to manipulate a user's mailbox, due to improper D-Bus security policy configurations. An arbitrary email can also be sent from the mailbox via the paired smartphone. This affects Tizen-based firmwares including Samsung Galaxy Gear series before build RE2.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:17:38.462Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The wemail_consumer_service (from the built-in application wemail) in Samsung Galaxy Gear series allows an unprivileged process to manipulate a user\u0027s mailbox, due to improper D-Bus security policy configurations. An arbitrary email can also be sent from the mailbox via the paired smartphone. This affects Tizen-based firmwares including Samsung Galaxy Gear series before build RE2." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-01-22T13:03:26", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-16271", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The wemail_consumer_service (from the built-in application wemail) in Samsung Galaxy Gear series allows an unprivileged process to manipulate a user\u0027s mailbox, due to improper D-Bus security policy configurations. An arbitrary email can also be sent from the mailbox via the paired smartphone. This affects Tizen-based firmwares including Samsung Galaxy Gear series before build RE2." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf", "refsource": "MISC", "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf" }, { "name": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be", "refsource": "MISC", "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-16271", "datePublished": "2020-01-22T13:03:26", "dateReserved": "2018-08-31T00:00:00", "dateUpdated": "2024-08-05T10:17:38.462Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }