Vulnerabilites related to linux - tizen
CVE-2018-16267 (GCVE-0-2018-16267)
Vulnerability from cvelistv5
Published
2020-01-22 12:49
Modified
2024-08-05 10:17
Severity ?
CWE
  • n/a
Summary
The system-popup system service in Tizen allows an unprivileged process to perform popup-related system actions, due to improper D-Bus security policy configurations. Such actions include the triggering system poweroff menu, and prompting a popup with arbitrary strings. This affects Tizen before 5.0 M1, and Tizen-based firmwares including Samsung Galaxy Gear series before build RE2.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T10:17:38.406Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://review.tizen.org/git/?p=platform/core/system/system-popup.git%3Ba=commit%3Bh=57b3c2f3cd61c6f432e7abe3a2d8b0df72fd4b0e"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The system-popup system service in Tizen allows an unprivileged process to perform popup-related system actions, due to improper D-Bus security policy configurations. Such actions include the triggering system poweroff menu, and prompting a popup with arbitrary strings. This affects Tizen before 5.0 M1, and Tizen-based firmwares including Samsung Galaxy Gear series before build RE2."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-01-22T12:49:24",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://review.tizen.org/git/?p=platform/core/system/system-popup.git%3Ba=commit%3Bh=57b3c2f3cd61c6f432e7abe3a2d8b0df72fd4b0e"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2018-16267",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The system-popup system service in Tizen allows an unprivileged process to perform popup-related system actions, due to improper D-Bus security policy configurations. Such actions include the triggering system poweroff menu, and prompting a popup with arbitrary strings. This affects Tizen before 5.0 M1, and Tizen-based firmwares including Samsung Galaxy Gear series before build RE2."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf",
              "refsource": "MISC",
              "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf"
            },
            {
              "name": "https://review.tizen.org/git/?p=platform/core/system/system-popup.git;a=commit;h=57b3c2f3cd61c6f432e7abe3a2d8b0df72fd4b0e",
              "refsource": "MISC",
              "url": "https://review.tizen.org/git/?p=platform/core/system/system-popup.git;a=commit;h=57b3c2f3cd61c6f432e7abe3a2d8b0df72fd4b0e"
            },
            {
              "name": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be",
              "refsource": "MISC",
              "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2018-16267",
    "datePublished": "2020-01-22T12:49:24",
    "dateReserved": "2018-08-31T00:00:00",
    "dateUpdated": "2024-08-05T10:17:38.406Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-25435 (GCVE-0-2021-25435)
Vulnerability from cvelistv5
Published
2021-07-08 13:46
Modified
2024-08-03 20:03
Severity ?
CWE
  • CWE-20 - Improper Input Validation
Summary
Improper input validation vulnerability in Tizen bootloader prior to Firmware update JUL-2021 Release allows arbitrary code execution using recovery partition in wireless firmware download mode.
Impacted products
Vendor Product Version
Samsung Mobile Tizen wearable devices Version: Tizen 5.5   < Firmware update JUL-2021 Release
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:03:05.748Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2021\u0026month=7"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Tizen wearable devices",
          "vendor": "Samsung Mobile",
          "versions": [
            {
              "lessThan": "Firmware update JUL-2021 Release",
              "status": "affected",
              "version": "Tizen 5.5",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper input validation vulnerability in Tizen bootloader prior to Firmware update JUL-2021 Release allows arbitrary code execution using recovery partition in wireless firmware download mode."
        }
      ],
      "metrics": [
        {
          "other": {
            "content": {
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
            },
            "type": "unknown"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20: Improper Input Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-07-08T13:46:59",
        "orgId": "3af57064-a867-422c-b2ad-40307b65c458",
        "shortName": "Samsung Mobile"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2021\u0026month=7"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "mobile.security@samsung.com",
          "ID": "CVE-2021-25435",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Tizen wearable devices",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Tizen 5.5",
                            "version_value": "Firmware update JUL-2021 Release"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Samsung Mobile"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper input validation vulnerability in Tizen bootloader prior to Firmware update JUL-2021 Release allows arbitrary code execution using recovery partition in wireless firmware download mode."
            }
          ]
        },
        "impact": {
          "cvss": {
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-20: Improper Input Validation"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://security.samsungmobile.com/serviceWeb.smsb?year=2021\u0026month=7",
              "refsource": "MISC",
              "url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2021\u0026month=7"
            }
          ]
        },
        "source": {
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "3af57064-a867-422c-b2ad-40307b65c458",
    "assignerShortName": "Samsung Mobile",
    "cveId": "CVE-2021-25435",
    "datePublished": "2021-07-08T13:46:59",
    "dateReserved": "2021-01-19T00:00:00",
    "dateUpdated": "2024-08-03T20:03:05.748Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-25436 (GCVE-0-2021-25436)
Vulnerability from cvelistv5
Published
2021-07-08 13:47
Modified
2024-08-03 20:03
Severity ?
CWE
  • CWE-20 - Improper Input Validation
Summary
Improper input validation vulnerability in Tizen FOTA service prior to Firmware update JUL-2021 Release allows arbitrary code execution via Samsung Accessory Protocol.
Impacted products
Vendor Product Version
Samsung Mobile Tizen wearable devices Version: Tizen 5.5   < Firmware update JUL-2021 Release
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:03:05.698Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2021\u0026month=7"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Tizen wearable devices",
          "vendor": "Samsung Mobile",
          "versions": [
            {
              "lessThan": "Firmware update JUL-2021 Release",
              "status": "affected",
              "version": "Tizen 5.5",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper input validation vulnerability in Tizen FOTA service prior to Firmware update JUL-2021 Release allows arbitrary code execution via Samsung Accessory Protocol."
        }
      ],
      "metrics": [
        {
          "other": {
            "content": {
              "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
            },
            "type": "unknown"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20: Improper Input Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-07-08T13:47:05",
        "orgId": "3af57064-a867-422c-b2ad-40307b65c458",
        "shortName": "Samsung Mobile"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2021\u0026month=7"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "mobile.security@samsung.com",
          "ID": "CVE-2021-25436",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Tizen wearable devices",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Tizen 5.5",
                            "version_value": "Firmware update JUL-2021 Release"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Samsung Mobile"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper input validation vulnerability in Tizen FOTA service prior to Firmware update JUL-2021 Release allows arbitrary code execution via Samsung Accessory Protocol."
            }
          ]
        },
        "impact": {
          "cvss": {
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-20: Improper Input Validation"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://security.samsungmobile.com/serviceWeb.smsb?year=2021\u0026month=7",
              "refsource": "MISC",
              "url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2021\u0026month=7"
            }
          ]
        },
        "source": {
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "3af57064-a867-422c-b2ad-40307b65c458",
    "assignerShortName": "Samsung Mobile",
    "cveId": "CVE-2021-25436",
    "datePublished": "2021-07-08T13:47:05",
    "dateReserved": "2021-01-19T00:00:00",
    "dateUpdated": "2024-08-03T20:03:05.698Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-6459 (GCVE-0-2012-6459)
Vulnerability from cvelistv5
Published
2013-01-01 15:00
Modified
2024-09-17 04:19
Severity ?
CWE
  • n/a
Summary
ConnMan 1.3 on Tizen continues to list the bluetooth service after offline mode has been enabled, which might allow remote attackers to obtain sensitive information via Bluetooth packets.
References
https://bugs.tizen.org/jira/browse/TIVI-211x_refsource_CONFIRM
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:28:39.823Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugs.tizen.org/jira/browse/TIVI-211"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "ConnMan 1.3 on Tizen continues to list the bluetooth service after offline mode has been enabled, which might allow remote attackers to obtain sensitive information via Bluetooth packets."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-01-01T15:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugs.tizen.org/jira/browse/TIVI-211"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2012-6459",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "ConnMan 1.3 on Tizen continues to list the bluetooth service after offline mode has been enabled, which might allow remote attackers to obtain sensitive information via Bluetooth packets."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugs.tizen.org/jira/browse/TIVI-211",
              "refsource": "CONFIRM",
              "url": "https://bugs.tizen.org/jira/browse/TIVI-211"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2012-6459",
    "datePublished": "2013-01-01T15:00:00Z",
    "dateReserved": "2013-01-01T00:00:00Z",
    "dateUpdated": "2024-09-17T04:19:36.354Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2018-16263 (GCVE-0-2018-16263)
Vulnerability from cvelistv5
Published
2020-01-22 12:41
Modified
2024-08-05 10:17
Severity ?
CWE
  • n/a
Summary
The PulseAudio system service in Tizen allows an unprivileged process to control its A2DP MediaEndpoint, due to improper D-Bus security policy configurations. This affects Tizen before 5.0 M1, and Tizen-based firmwares including Samsung Galaxy Gear series before build RE2.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T10:17:38.408Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://review.tizen.org/git/?p=platform/upstream/pulseaudio.git%3Ba=commit%3Bh=81e8ba9f3ab0917da4fdfa094f49333be57964c6"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The PulseAudio system service in Tizen allows an unprivileged process to control its A2DP MediaEndpoint, due to improper D-Bus security policy configurations. This affects Tizen before 5.0 M1, and Tizen-based firmwares including Samsung Galaxy Gear series before build RE2."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-01-22T12:41:08",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://review.tizen.org/git/?p=platform/upstream/pulseaudio.git%3Ba=commit%3Bh=81e8ba9f3ab0917da4fdfa094f49333be57964c6"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2018-16263",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The PulseAudio system service in Tizen allows an unprivileged process to control its A2DP MediaEndpoint, due to improper D-Bus security policy configurations. This affects Tizen before 5.0 M1, and Tizen-based firmwares including Samsung Galaxy Gear series before build RE2."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf",
              "refsource": "MISC",
              "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf"
            },
            {
              "name": "https://review.tizen.org/git/?p=platform/upstream/pulseaudio.git;a=commit;h=81e8ba9f3ab0917da4fdfa094f49333be57964c6",
              "refsource": "MISC",
              "url": "https://review.tizen.org/git/?p=platform/upstream/pulseaudio.git;a=commit;h=81e8ba9f3ab0917da4fdfa094f49333be57964c6"
            },
            {
              "name": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be",
              "refsource": "MISC",
              "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2018-16263",
    "datePublished": "2020-01-22T12:41:08",
    "dateReserved": "2018-08-31T00:00:00",
    "dateUpdated": "2024-08-05T10:17:38.408Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2018-16266 (GCVE-0-2018-16266)
Vulnerability from cvelistv5
Published
2020-01-22 12:15
Modified
2024-08-05 10:17
Severity ?
CWE
  • n/a
Summary
The Enlightenment system service in Tizen allows an unprivileged process to fully control or capture windows, due to improper D-Bus security policy configurations. This affects Tizen before 5.0 M1, and Tizen-based firmwares including Samsung Galaxy Gear series before build RE2.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T10:17:38.354Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://review.tizen.org/git/?p=platform/upstream/enlightenment.git%3Ba=commit%3Bh=8ff5c24d04f97b1c84b463535876600b22128fb4"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The Enlightenment system service in Tizen allows an unprivileged process to fully control or capture windows, due to improper D-Bus security policy configurations. This affects Tizen before 5.0 M1, and Tizen-based firmwares including Samsung Galaxy Gear series before build RE2."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-01-22T12:15:27",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://review.tizen.org/git/?p=platform/upstream/enlightenment.git%3Ba=commit%3Bh=8ff5c24d04f97b1c84b463535876600b22128fb4"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2018-16266",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Enlightenment system service in Tizen allows an unprivileged process to fully control or capture windows, due to improper D-Bus security policy configurations. This affects Tizen before 5.0 M1, and Tizen-based firmwares including Samsung Galaxy Gear series before build RE2."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf",
              "refsource": "MISC",
              "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf"
            },
            {
              "name": "https://review.tizen.org/git/?p=platform/upstream/enlightenment.git;a=commit;h=8ff5c24d04f97b1c84b463535876600b22128fb4",
              "refsource": "MISC",
              "url": "https://review.tizen.org/git/?p=platform/upstream/enlightenment.git;a=commit;h=8ff5c24d04f97b1c84b463535876600b22128fb4"
            },
            {
              "name": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be",
              "refsource": "MISC",
              "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2018-16266",
    "datePublished": "2020-01-22T12:15:27",
    "dateReserved": "2018-08-31T00:00:00",
    "dateUpdated": "2024-08-05T10:17:38.354Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2018-16268 (GCVE-0-2018-16268)
Vulnerability from cvelistv5
Published
2020-01-22 12:51
Modified
2024-08-05 10:17
Severity ?
CWE
  • n/a
Summary
The SoundServer/FocusServer system services in Tizen allow an unprivileged process to perform media-related system actions, due to improper D-Bus security policy configurations. Such actions include playing an arbitrary sound file or DTMF tones. This affects Tizen before 5.0 M1, and Tizen-based firmwares including Samsung Galaxy Gear series before build RE2.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T10:17:38.384Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://review.tizen.org/git/?p=platform/core/multimedia/libmm-sound.git%3Ba=commit%3Bh=7fce6f2d6d480b3bd0e84a5ba3f72173a37e36db"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The SoundServer/FocusServer system services in Tizen allow an unprivileged process to perform media-related system actions, due to improper D-Bus security policy configurations. Such actions include playing an arbitrary sound file or DTMF tones. This affects Tizen before 5.0 M1, and Tizen-based firmwares including Samsung Galaxy Gear series before build RE2."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-01-22T12:51:16",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://review.tizen.org/git/?p=platform/core/multimedia/libmm-sound.git%3Ba=commit%3Bh=7fce6f2d6d480b3bd0e84a5ba3f72173a37e36db"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2018-16268",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The SoundServer/FocusServer system services in Tizen allow an unprivileged process to perform media-related system actions, due to improper D-Bus security policy configurations. Such actions include playing an arbitrary sound file or DTMF tones. This affects Tizen before 5.0 M1, and Tizen-based firmwares including Samsung Galaxy Gear series before build RE2."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf",
              "refsource": "MISC",
              "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf"
            },
            {
              "name": "https://review.tizen.org/git/?p=platform/core/multimedia/libmm-sound.git;a=commit;h=7fce6f2d6d480b3bd0e84a5ba3f72173a37e36db",
              "refsource": "MISC",
              "url": "https://review.tizen.org/git/?p=platform/core/multimedia/libmm-sound.git;a=commit;h=7fce6f2d6d480b3bd0e84a5ba3f72173a37e36db"
            },
            {
              "name": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be",
              "refsource": "MISC",
              "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2018-16268",
    "datePublished": "2020-01-22T12:51:16",
    "dateReserved": "2018-08-31T00:00:00",
    "dateUpdated": "2024-08-05T10:17:38.384Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-25434 (GCVE-0-2021-25434)
Vulnerability from cvelistv5
Published
2021-07-08 13:45
Modified
2024-08-03 20:03
Severity ?
CWE
  • CWE-20 - Improper Input Validation
Summary
Improper input validation vulnerability in Tizen bootloader prior to Firmware update JUL-2021 Release allows arbitrary code execution using param partition in wireless firmware download mode.
Impacted products
Vendor Product Version
Samsung Mobile Tizen wearable devices Version: Tizen 5.5   < Firmware update JUL-2021 Release
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:03:05.655Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2021\u0026month=7"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Tizen wearable devices",
          "vendor": "Samsung Mobile",
          "versions": [
            {
              "lessThan": "Firmware update JUL-2021 Release",
              "status": "affected",
              "version": "Tizen 5.5",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper input validation vulnerability in Tizen bootloader prior to Firmware update JUL-2021 Release allows arbitrary code execution using param partition in wireless firmware download mode."
        }
      ],
      "metrics": [
        {
          "other": {
            "content": {
              "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
            },
            "type": "unknown"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20: Improper Input Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-07-08T13:45:56",
        "orgId": "3af57064-a867-422c-b2ad-40307b65c458",
        "shortName": "Samsung Mobile"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2021\u0026month=7"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "mobile.security@samsung.com",
          "ID": "CVE-2021-25434",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Tizen wearable devices",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Tizen 5.5",
                            "version_value": "Firmware update JUL-2021 Release"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Samsung Mobile"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper input validation vulnerability in Tizen bootloader prior to Firmware update JUL-2021 Release allows arbitrary code execution using param partition in wireless firmware download mode."
            }
          ]
        },
        "impact": {
          "cvss": {
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-20: Improper Input Validation"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://security.samsungmobile.com/serviceWeb.smsb?year=2021\u0026month=7",
              "refsource": "MISC",
              "url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2021\u0026month=7"
            }
          ]
        },
        "source": {
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "3af57064-a867-422c-b2ad-40307b65c458",
    "assignerShortName": "Samsung Mobile",
    "cveId": "CVE-2021-25434",
    "datePublished": "2021-07-08T13:45:56",
    "dateReserved": "2021-01-19T00:00:00",
    "dateUpdated": "2024-08-03T20:03:05.655Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-25433 (GCVE-0-2021-25433)
Vulnerability from cvelistv5
Published
2021-07-08 13:45
Modified
2024-08-03 20:03
Severity ?
CWE
Summary
Improper authorization vulnerability in Tizen factory reset policy prior to Firmware update JUL-2021 Release allows untrusted applications to perform factory reset using dbus signal.
Impacted products
Vendor Product Version
Samsung Mobile Tizen wearable devices Version: Tizen 5.5   < Firmware update JUL-2021 Release
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:03:05.635Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2021\u0026month=7"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Tizen wearable devices",
          "vendor": "Samsung Mobile",
          "versions": [
            {
              "lessThan": "Firmware update JUL-2021 Release",
              "status": "affected",
              "version": "Tizen 5.5",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper authorization vulnerability in Tizen factory reset policy prior to Firmware update JUL-2021 Release allows untrusted applications to perform factory reset using dbus signal."
        }
      ],
      "metrics": [
        {
          "other": {
            "content": {
              "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
            },
            "type": "unknown"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-285",
              "description": "CWE-285: Improper Authorization",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-07-08T13:45:49",
        "orgId": "3af57064-a867-422c-b2ad-40307b65c458",
        "shortName": "Samsung Mobile"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2021\u0026month=7"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "mobile.security@samsung.com",
          "ID": "CVE-2021-25433",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Tizen wearable devices",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Tizen 5.5",
                            "version_value": "Firmware update JUL-2021 Release"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Samsung Mobile"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper authorization vulnerability in Tizen factory reset policy prior to Firmware update JUL-2021 Release allows untrusted applications to perform factory reset using dbus signal."
            }
          ]
        },
        "impact": {
          "cvss": {
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-285: Improper Authorization"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://security.samsungmobile.com/serviceWeb.smsb?year=2021\u0026month=7",
              "refsource": "MISC",
              "url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2021\u0026month=7"
            }
          ]
        },
        "source": {
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "3af57064-a867-422c-b2ad-40307b65c458",
    "assignerShortName": "Samsung Mobile",
    "cveId": "CVE-2021-25433",
    "datePublished": "2021-07-08T13:45:49",
    "dateReserved": "2021-01-19T00:00:00",
    "dateUpdated": "2024-08-03T20:03:05.635Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2018-16265 (GCVE-0-2018-16265)
Vulnerability from cvelistv5
Published
2020-01-22 12:45
Modified
2024-08-05 10:17
Severity ?
CWE
  • n/a
Summary
The bt/bt_core system service in Tizen allows an unprivileged process to create a system user interface and control the Bluetooth pairing process, due to improper D-Bus security policy configurations. This affects Tizen before 5.0 M1, and Tizen-based firmwares including Samsung Galaxy Gear series before build RE2.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T10:17:38.375Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://review.tizen.org/git/?p=platform/core/connectivity/bluetooth-frwk.git%3Ba=commit%3Bh=074dfc9709d8cee84564fc815796b0ef0c3273f5"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://review.tizen.org/git/?p=platform/core/connectivity/bluetooth-frwk.git%3Ba=commit%3Bh=bafbd66906ae5712874dc0d7dd6288d2c1ae4db2"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The bt/bt_core system service in Tizen allows an unprivileged process to create a system user interface and control the Bluetooth pairing process, due to improper D-Bus security policy configurations. This affects Tizen before 5.0 M1, and Tizen-based firmwares including Samsung Galaxy Gear series before build RE2."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-01-22T12:45:43",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://review.tizen.org/git/?p=platform/core/connectivity/bluetooth-frwk.git%3Ba=commit%3Bh=074dfc9709d8cee84564fc815796b0ef0c3273f5"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://review.tizen.org/git/?p=platform/core/connectivity/bluetooth-frwk.git%3Ba=commit%3Bh=bafbd66906ae5712874dc0d7dd6288d2c1ae4db2"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2018-16265",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The bt/bt_core system service in Tizen allows an unprivileged process to create a system user interface and control the Bluetooth pairing process, due to improper D-Bus security policy configurations. This affects Tizen before 5.0 M1, and Tizen-based firmwares including Samsung Galaxy Gear series before build RE2."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf",
              "refsource": "MISC",
              "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf"
            },
            {
              "name": "https://review.tizen.org/git/?p=platform/core/connectivity/bluetooth-frwk.git;a=commit;h=074dfc9709d8cee84564fc815796b0ef0c3273f5",
              "refsource": "MISC",
              "url": "https://review.tizen.org/git/?p=platform/core/connectivity/bluetooth-frwk.git;a=commit;h=074dfc9709d8cee84564fc815796b0ef0c3273f5"
            },
            {
              "name": "https://review.tizen.org/git/?p=platform/core/connectivity/bluetooth-frwk.git;a=commit;h=bafbd66906ae5712874dc0d7dd6288d2c1ae4db2",
              "refsource": "MISC",
              "url": "https://review.tizen.org/git/?p=platform/core/connectivity/bluetooth-frwk.git;a=commit;h=bafbd66906ae5712874dc0d7dd6288d2c1ae4db2"
            },
            {
              "name": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be",
              "refsource": "MISC",
              "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2018-16265",
    "datePublished": "2020-01-22T12:45:43",
    "dateReserved": "2018-08-31T00:00:00",
    "dateUpdated": "2024-08-05T10:17:38.375Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2018-16262 (GCVE-0-2018-16262)
Vulnerability from cvelistv5
Published
2020-01-22 12:20
Modified
2024-08-05 10:17
Severity ?
CWE
  • n/a
Summary
The pkgmgr system service in Tizen allows an unprivileged process to perform package management actions, due to improper D-Bus security policy configurations. Such actions include installing, decrypting, and killing other packages. This affects Tizen before 5.0 M1, and Tizen-based firmwares including Samsung Galaxy Gear series before build RE2.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T10:17:38.427Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://review.tizen.org/git/?p=platform/core/appfw/pkgmgr-server.git%3Ba=commit%3Bh=aac8a95859828a058d8e06893982b11ebc81dd78"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The pkgmgr system service in Tizen allows an unprivileged process to perform package management actions, due to improper D-Bus security policy configurations. Such actions include installing, decrypting, and killing other packages. This affects Tizen before 5.0 M1, and Tizen-based firmwares including Samsung Galaxy Gear series before build RE2."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-01-22T12:22:07",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://review.tizen.org/git/?p=platform/core/appfw/pkgmgr-server.git%3Ba=commit%3Bh=aac8a95859828a058d8e06893982b11ebc81dd78"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2018-16262",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The pkgmgr system service in Tizen allows an unprivileged process to perform package management actions, due to improper D-Bus security policy configurations. Such actions include installing, decrypting, and killing other packages. This affects Tizen before 5.0 M1, and Tizen-based firmwares including Samsung Galaxy Gear series before build RE2."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://review.tizen.org/git/?p=platform/core/appfw/pkgmgr-server.git;a=commit;h=aac8a95859828a058d8e06893982b11ebc81dd78",
              "refsource": "MISC",
              "url": "https://review.tizen.org/git/?p=platform/core/appfw/pkgmgr-server.git;a=commit;h=aac8a95859828a058d8e06893982b11ebc81dd78"
            },
            {
              "name": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf",
              "refsource": "MISC",
              "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf"
            },
            {
              "name": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be",
              "refsource": "MISC",
              "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2018-16262",
    "datePublished": "2020-01-22T12:20:33",
    "dateReserved": "2018-08-31T00:00:00",
    "dateUpdated": "2024-08-05T10:17:38.427Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2018-16264 (GCVE-0-2018-16264)
Vulnerability from cvelistv5
Published
2020-01-22 12:42
Modified
2024-08-05 10:17
Severity ?
CWE
  • n/a
Summary
The BlueZ system service in Tizen allows an unprivileged process to partially control Bluetooth or acquire sensitive information, due to improper D-Bus security policy configurations. This affects Tizen before 5.0 M1, and Tizen-based firmwares including Samsung Galaxy Gear series before build RE2.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T10:17:38.341Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://review.tizen.org/git/?p=platform/upstream/bluez.git%3Ba=commit%3Bh=ff9878c95efc12d4a4495153ab51e3a09f8d3c01"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The BlueZ system service in Tizen allows an unprivileged process to partially control Bluetooth or acquire sensitive information, due to improper D-Bus security policy configurations. This affects Tizen before 5.0 M1, and Tizen-based firmwares including Samsung Galaxy Gear series before build RE2."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-01-22T12:42:59",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://review.tizen.org/git/?p=platform/upstream/bluez.git%3Ba=commit%3Bh=ff9878c95efc12d4a4495153ab51e3a09f8d3c01"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2018-16264",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The BlueZ system service in Tizen allows an unprivileged process to partially control Bluetooth or acquire sensitive information, due to improper D-Bus security policy configurations. This affects Tizen before 5.0 M1, and Tizen-based firmwares including Samsung Galaxy Gear series before build RE2."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf",
              "refsource": "MISC",
              "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf"
            },
            {
              "name": "https://review.tizen.org/git/?p=platform/upstream/bluez.git;a=commit;h=ff9878c95efc12d4a4495153ab51e3a09f8d3c01",
              "refsource": "MISC",
              "url": "https://review.tizen.org/git/?p=platform/upstream/bluez.git;a=commit;h=ff9878c95efc12d4a4495153ab51e3a09f8d3c01"
            },
            {
              "name": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be",
              "refsource": "MISC",
              "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2018-16264",
    "datePublished": "2020-01-22T12:42:59",
    "dateReserved": "2018-08-31T00:00:00",
    "dateUpdated": "2024-08-05T10:17:38.341Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-25437 (GCVE-0-2021-25437)
Vulnerability from cvelistv5
Published
2021-07-08 13:47
Modified
2024-08-03 20:03
Severity ?
CWE
  • CWE-20 - Improper Input Validation
Summary
Improper access control vulnerability in Tizen FOTA service prior to Firmware update JUL-2021 Release allows attackers to arbitrary code execution by replacing FOTA update file.
Impacted products
Vendor Product Version
Samsung Mobile Tizen wearable devices Version: Tizen 5.5   < Firmware update JUL-2021 Release
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:03:05.658Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2021\u0026month=7"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Tizen wearable devices",
          "vendor": "Samsung Mobile",
          "versions": [
            {
              "lessThan": "Firmware update JUL-2021 Release",
              "status": "affected",
              "version": "Tizen 5.5",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper access control vulnerability in Tizen FOTA service prior to Firmware update JUL-2021 Release allows attackers to arbitrary code execution by replacing FOTA update file."
        }
      ],
      "metrics": [
        {
          "other": {
            "content": {
              "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
            },
            "type": "unknown"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20: Improper Input Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-07-08T13:47:11",
        "orgId": "3af57064-a867-422c-b2ad-40307b65c458",
        "shortName": "Samsung Mobile"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2021\u0026month=7"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "mobile.security@samsung.com",
          "ID": "CVE-2021-25437",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Tizen wearable devices",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Tizen 5.5",
                            "version_value": "Firmware update JUL-2021 Release"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Samsung Mobile"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper access control vulnerability in Tizen FOTA service prior to Firmware update JUL-2021 Release allows attackers to arbitrary code execution by replacing FOTA update file."
            }
          ]
        },
        "impact": {
          "cvss": {
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-20: Improper Input Validation"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://security.samsungmobile.com/serviceWeb.smsb?year=2021\u0026month=7",
              "refsource": "MISC",
              "url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2021\u0026month=7"
            }
          ]
        },
        "source": {
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "3af57064-a867-422c-b2ad-40307b65c458",
    "assignerShortName": "Samsung Mobile",
    "cveId": "CVE-2021-25437",
    "datePublished": "2021-07-08T13:47:11",
    "dateReserved": "2021-01-19T00:00:00",
    "dateUpdated": "2024-08-03T20:03:05.658Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2021-07-08 14:15
Modified
2024-11-21 05:54
Severity ?
Summary
Improper input validation vulnerability in Tizen bootloader prior to Firmware update JUL-2021 Release allows arbitrary code execution using recovery partition in wireless firmware download mode.
Impacted products
Vendor Product Version
linux tizen *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:linux:tizen:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8A186D7-A9F7-4D4B-9D4F-F3C239695EE9",
              "versionEndExcluding": "5.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper input validation vulnerability in Tizen bootloader prior to Firmware update JUL-2021 Release allows arbitrary code execution using recovery partition in wireless firmware download mode."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de comprobaci\u00f3n de entrada inapropiada en el cargador de arranque de Tizen anterior a la actualizaci\u00f3n del firmware JUL-2021 Release, permite una ejecuci\u00f3n de c\u00f3digo arbitrario usando la partici\u00f3n de recuperaci\u00f3n en el modo de descarga del firmware inal\u00e1mbrico"
    }
  ],
  "id": "CVE-2021-25435",
  "lastModified": "2024-11-21T05:54:58.930",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-07-08T14:15:08.720",
  "references": [
    {
      "source": "mobile.security@samsung.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2021\u0026month=7"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2021\u0026month=7"
    }
  ],
  "sourceIdentifier": "mobile.security@samsung.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "mobile.security@samsung.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-01-01 15:55
Modified
2025-04-11 00:51
Severity ?
Summary
ConnMan 1.3 on Tizen continues to list the bluetooth service after offline mode has been enabled, which might allow remote attackers to obtain sensitive information via Bluetooth packets.
Impacted products
Vendor Product Version
intel connman 1.3
linux tizen -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:connman:1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5333D31A-FFBF-407D-ABFF-8773D3CAEC57",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:linux:tizen:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1E96ED5-6803-40EE-9750-71631A45C74D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "ConnMan 1.3 on Tizen continues to list the bluetooth service after offline mode has been enabled, which might allow remote attackers to obtain sensitive information via Bluetooth packets."
    },
    {
      "lang": "es",
      "value": "ConnMan v1.3 en Tizen sigue enumerando el servicio de bluetooth despu\u00e9s que el modo fuera de l\u00ednea se ha activado, lo que podr\u00eda permitir a atacantes remotos obtener informaci\u00f3n sensible a trav\u00e9s de paquetes Bluetooth."
    }
  ],
  "id": "CVE-2012-6459",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-01-01T15:55:02.757",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "https://bugs.tizen.org/jira/browse/TIVI-211"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugs.tizen.org/jira/browse/TIVI-211"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-01-22 13:15
Modified
2024-11-21 03:52
Summary
The pkgmgr system service in Tizen allows an unprivileged process to perform package management actions, due to improper D-Bus security policy configurations. Such actions include installing, decrypting, and killing other packages. This affects Tizen before 5.0 M1, and Tizen-based firmwares including Samsung Galaxy Gear series before build RE2.
Impacted products
Vendor Product Version
linux tizen 1.0
linux tizen 1.0
linux tizen 2.0
linux tizen 2.1
linux tizen 2.2
linux tizen 2.2.1
linux tizen 2.3
linux tizen 2.3.1
linux tizen 2.4
linux tizen 3.0
linux tizen 3.0
linux tizen 3.0
linux tizen 4.0
linux tizen 4.0
linux tizen 4.0
linux tizen 5.0
samsung galaxy_gear -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:linux:tizen:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CE14F41-1DA4-4FB3-AC1E-53B38CE81A13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:1.0:m1:*:*:*:*:*:*",
              "matchCriteriaId": "20D9C36E-A873-46A7-A8BA-4A5E0A4BCCA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "394C885B-4641-4AE1-913F-1DE2707897DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C67EE22-0987-4CB5-82C6-18D2AB6D8691",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E7F6A42-2ECF-4948-A31C-F212E4AF0158",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F08ED37-2F08-4663-ADCC-DA8608AFEF68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF125805-DE1F-4791-8B25-3759C00C184E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "44D78961-9103-4C1A-95A7-33CECC3F1172",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A859D388-C803-4562-A83E-89C15AE69F67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8ED4739E-DB36-4298-B6D5-8905B1DB5B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:3.0:m2:*:*:*:*:*:*",
              "matchCriteriaId": "E9F67075-9BCB-4EFF-BE36-790655A96679",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:3.0:m3:*:*:*:*:*:*",
              "matchCriteriaId": "4667DAE4-A021-4051-8C6F-AA60597FB575",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:4.0:m1:*:*:*:*:*:*",
              "matchCriteriaId": "43386546-ECB4-4131-A0CA-C9D939C6BD75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:4.0:m2:*:*:*:*:*:*",
              "matchCriteriaId": "6A8490E0-CE6A-453B-9DD6-C2D8A777FC82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:4.0:m3:*:*:*:*:*:*",
              "matchCriteriaId": "D32007B2-74B6-44A3-8C6F-BB4141B6824A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "85EDFA9B-354F-4992-8565-6F39E5AC7EB5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:samsung:galaxy_gear:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B033BF3-3C56-4B7A-92B5-8D1024EB36EE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The pkgmgr system service in Tizen allows an unprivileged process to perform package management actions, due to improper D-Bus security policy configurations. Such actions include installing, decrypting, and killing other packages. This affects Tizen before 5.0 M1, and Tizen-based firmwares including Samsung Galaxy Gear series before build RE2."
    },
    {
      "lang": "es",
      "value": "El servicio de sistema pkgmgr en Tizen permite a un proceso no privilegiado llevar a cabo acciones de administraci\u00f3n de paquetes, debido a configuraciones de pol\u00edtica de seguridad D-Bus inapropiadas. Dichas acciones incluyen instalar, descifrar y eliminar otros paquetes. Esto afecta a Tizen versiones anteriores a 5.0 M1 y a los firmwares basados en Tizen, incluyendo la serie Samsung Galaxy Gear versiones anteriores al build RE2."
    }
  ],
  "id": "CVE-2018-16262",
  "lastModified": "2024-11-21T03:52:24.283",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-01-22T13:15:10.020",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://review.tizen.org/git/?p=platform/core/appfw/pkgmgr-server.git%3Ba=commit%3Bh=aac8a95859828a058d8e06893982b11ebc81dd78"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://review.tizen.org/git/?p=platform/core/appfw/pkgmgr-server.git%3Ba=commit%3Bh=aac8a95859828a058d8e06893982b11ebc81dd78"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-269"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-01-22 13:15
Modified
2024-11-21 03:52
Summary
The bt/bt_core system service in Tizen allows an unprivileged process to create a system user interface and control the Bluetooth pairing process, due to improper D-Bus security policy configurations. This affects Tizen before 5.0 M1, and Tizen-based firmwares including Samsung Galaxy Gear series before build RE2.
Impacted products
Vendor Product Version
linux tizen 1.0
linux tizen 1.0
linux tizen 2.0
linux tizen 2.1
linux tizen 2.2
linux tizen 2.2.1
linux tizen 2.3
linux tizen 2.3.1
linux tizen 2.4
linux tizen 3.0
linux tizen 3.0
linux tizen 3.0
linux tizen 4.0
linux tizen 4.0
linux tizen 4.0
linux tizen 5.0
samsung galaxy_gear -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:linux:tizen:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CE14F41-1DA4-4FB3-AC1E-53B38CE81A13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:1.0:m1:*:*:*:*:*:*",
              "matchCriteriaId": "20D9C36E-A873-46A7-A8BA-4A5E0A4BCCA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "394C885B-4641-4AE1-913F-1DE2707897DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C67EE22-0987-4CB5-82C6-18D2AB6D8691",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E7F6A42-2ECF-4948-A31C-F212E4AF0158",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F08ED37-2F08-4663-ADCC-DA8608AFEF68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF125805-DE1F-4791-8B25-3759C00C184E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "44D78961-9103-4C1A-95A7-33CECC3F1172",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A859D388-C803-4562-A83E-89C15AE69F67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8ED4739E-DB36-4298-B6D5-8905B1DB5B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:3.0:m2:*:*:*:*:*:*",
              "matchCriteriaId": "E9F67075-9BCB-4EFF-BE36-790655A96679",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:3.0:m3:*:*:*:*:*:*",
              "matchCriteriaId": "4667DAE4-A021-4051-8C6F-AA60597FB575",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:4.0:m1:*:*:*:*:*:*",
              "matchCriteriaId": "43386546-ECB4-4131-A0CA-C9D939C6BD75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:4.0:m2:*:*:*:*:*:*",
              "matchCriteriaId": "6A8490E0-CE6A-453B-9DD6-C2D8A777FC82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:4.0:m3:*:*:*:*:*:*",
              "matchCriteriaId": "D32007B2-74B6-44A3-8C6F-BB4141B6824A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "85EDFA9B-354F-4992-8565-6F39E5AC7EB5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:samsung:galaxy_gear:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B033BF3-3C56-4B7A-92B5-8D1024EB36EE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The bt/bt_core system service in Tizen allows an unprivileged process to create a system user interface and control the Bluetooth pairing process, due to improper D-Bus security policy configurations. This affects Tizen before 5.0 M1, and Tizen-based firmwares including Samsung Galaxy Gear series before build RE2."
    },
    {
      "lang": "es",
      "value": "El servicio de sistema bt/bt_core en Tizen, permite a un proceso no privilegiado crear una interfaz de usuario del sistema y controlar el proceso de emparejamiento de Bluetooth, debido a configuraciones de pol\u00edtica de seguridad D-Bus inapropiadas. Esto afecta a Tizen versiones anteriores a 5.0 M1 y a los firmwares basados ??en Tizen, incluyendo la serie Samsung Galaxy Gear versiones anteriores al build RE2."
    }
  ],
  "id": "CVE-2018-16265",
  "lastModified": "2024-11-21T03:52:24.787",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 3.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-01-22T13:15:10.240",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://review.tizen.org/git/?p=platform/core/connectivity/bluetooth-frwk.git%3Ba=commit%3Bh=074dfc9709d8cee84564fc815796b0ef0c3273f5"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://review.tizen.org/git/?p=platform/core/connectivity/bluetooth-frwk.git%3Ba=commit%3Bh=bafbd66906ae5712874dc0d7dd6288d2c1ae4db2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://review.tizen.org/git/?p=platform/core/connectivity/bluetooth-frwk.git%3Ba=commit%3Bh=074dfc9709d8cee84564fc815796b0ef0c3273f5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://review.tizen.org/git/?p=platform/core/connectivity/bluetooth-frwk.git%3Ba=commit%3Bh=bafbd66906ae5712874dc0d7dd6288d2c1ae4db2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-269"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-07-08 14:15
Modified
2024-11-21 05:54
Severity ?
Summary
Improper input validation vulnerability in Tizen FOTA service prior to Firmware update JUL-2021 Release allows arbitrary code execution via Samsung Accessory Protocol.
Impacted products
Vendor Product Version
linux tizen *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:linux:tizen:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8A186D7-A9F7-4D4B-9D4F-F3C239695EE9",
              "versionEndExcluding": "5.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper input validation vulnerability in Tizen FOTA service prior to Firmware update JUL-2021 Release allows arbitrary code execution via Samsung Accessory Protocol."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de comprobaci\u00f3n de entrada inapropiada en el servicio FOTA de Tizen anterior a la actualizaci\u00f3n del firmware JUL-2021 Release, permite una ejecuci\u00f3n de c\u00f3digo arbitrario por medio del Protocolo de Accesorios de Samsung"
    }
  ],
  "id": "CVE-2021-25436",
  "lastModified": "2024-11-21T05:54:59.050",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-07-08T14:15:08.787",
  "references": [
    {
      "source": "mobile.security@samsung.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2021\u0026month=7"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2021\u0026month=7"
    }
  ],
  "sourceIdentifier": "mobile.security@samsung.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "mobile.security@samsung.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-01-22 13:15
Modified
2024-11-21 03:52
Summary
The system-popup system service in Tizen allows an unprivileged process to perform popup-related system actions, due to improper D-Bus security policy configurations. Such actions include the triggering system poweroff menu, and prompting a popup with arbitrary strings. This affects Tizen before 5.0 M1, and Tizen-based firmwares including Samsung Galaxy Gear series before build RE2.
Impacted products
Vendor Product Version
linux tizen 1.0
linux tizen 1.0
linux tizen 2.0
linux tizen 2.1
linux tizen 2.2
linux tizen 2.2.1
linux tizen 2.3
linux tizen 2.3.1
linux tizen 2.4
linux tizen 3.0
linux tizen 3.0
linux tizen 3.0
linux tizen 4.0
linux tizen 4.0
linux tizen 4.0
linux tizen 5.0
samsung galaxy_gear -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:linux:tizen:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CE14F41-1DA4-4FB3-AC1E-53B38CE81A13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:1.0:m1:*:*:*:*:*:*",
              "matchCriteriaId": "20D9C36E-A873-46A7-A8BA-4A5E0A4BCCA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "394C885B-4641-4AE1-913F-1DE2707897DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C67EE22-0987-4CB5-82C6-18D2AB6D8691",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E7F6A42-2ECF-4948-A31C-F212E4AF0158",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F08ED37-2F08-4663-ADCC-DA8608AFEF68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF125805-DE1F-4791-8B25-3759C00C184E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "44D78961-9103-4C1A-95A7-33CECC3F1172",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A859D388-C803-4562-A83E-89C15AE69F67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8ED4739E-DB36-4298-B6D5-8905B1DB5B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:3.0:m2:*:*:*:*:*:*",
              "matchCriteriaId": "E9F67075-9BCB-4EFF-BE36-790655A96679",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:3.0:m3:*:*:*:*:*:*",
              "matchCriteriaId": "4667DAE4-A021-4051-8C6F-AA60597FB575",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:4.0:m1:*:*:*:*:*:*",
              "matchCriteriaId": "43386546-ECB4-4131-A0CA-C9D939C6BD75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:4.0:m2:*:*:*:*:*:*",
              "matchCriteriaId": "6A8490E0-CE6A-453B-9DD6-C2D8A777FC82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:4.0:m3:*:*:*:*:*:*",
              "matchCriteriaId": "D32007B2-74B6-44A3-8C6F-BB4141B6824A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "85EDFA9B-354F-4992-8565-6F39E5AC7EB5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:samsung:galaxy_gear:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B033BF3-3C56-4B7A-92B5-8D1024EB36EE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The system-popup system service in Tizen allows an unprivileged process to perform popup-related system actions, due to improper D-Bus security policy configurations. Such actions include the triggering system poweroff menu, and prompting a popup with arbitrary strings. This affects Tizen before 5.0 M1, and Tizen-based firmwares including Samsung Galaxy Gear series before build RE2."
    },
    {
      "lang": "es",
      "value": "El servicio de sistema system-popup en Tizen, permite a un proceso no privilegiado llevar a cabo acciones de sistema relacionadas con ventanas emergentes, debido a configuraciones de pol\u00edtica de seguridad D-Bus inapropiadas. Dichas acciones incluyen la activaci\u00f3n del men\u00fa poweroff del sistema y generaci\u00f3n de una ventana emergente con cadenas arbitrarias. Esto afecta a Tizen versiones anteriores a 5.0 M1 y a los firmwares basados ??en Tizen, incluyendo la serie Samsung Galaxy Gear versiones anteriores al build RE2."
    }
  ],
  "id": "CVE-2018-16267",
  "lastModified": "2024-11-21T03:52:25.113",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.1,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-01-22T13:15:10.410",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://review.tizen.org/git/?p=platform/core/system/system-popup.git%3Ba=commit%3Bh=57b3c2f3cd61c6f432e7abe3a2d8b0df72fd4b0e"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://review.tizen.org/git/?p=platform/core/system/system-popup.git%3Ba=commit%3Bh=57b3c2f3cd61c6f432e7abe3a2d8b0df72fd4b0e"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-269"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-01-22 13:15
Modified
2024-11-21 03:52
Summary
The SoundServer/FocusServer system services in Tizen allow an unprivileged process to perform media-related system actions, due to improper D-Bus security policy configurations. Such actions include playing an arbitrary sound file or DTMF tones. This affects Tizen before 5.0 M1, and Tizen-based firmwares including Samsung Galaxy Gear series before build RE2.
Impacted products
Vendor Product Version
linux tizen 1.0
linux tizen 1.0
linux tizen 2.0
linux tizen 2.1
linux tizen 2.2
linux tizen 2.2.1
linux tizen 2.3
linux tizen 2.3.1
linux tizen 2.4
linux tizen 3.0
linux tizen 3.0
linux tizen 3.0
linux tizen 4.0
linux tizen 4.0
linux tizen 4.0
linux tizen 5.0
samsung galaxy_gear -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:linux:tizen:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CE14F41-1DA4-4FB3-AC1E-53B38CE81A13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:1.0:m1:*:*:*:*:*:*",
              "matchCriteriaId": "20D9C36E-A873-46A7-A8BA-4A5E0A4BCCA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "394C885B-4641-4AE1-913F-1DE2707897DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C67EE22-0987-4CB5-82C6-18D2AB6D8691",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E7F6A42-2ECF-4948-A31C-F212E4AF0158",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F08ED37-2F08-4663-ADCC-DA8608AFEF68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF125805-DE1F-4791-8B25-3759C00C184E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "44D78961-9103-4C1A-95A7-33CECC3F1172",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A859D388-C803-4562-A83E-89C15AE69F67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8ED4739E-DB36-4298-B6D5-8905B1DB5B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:3.0:m2:*:*:*:*:*:*",
              "matchCriteriaId": "E9F67075-9BCB-4EFF-BE36-790655A96679",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:3.0:m3:*:*:*:*:*:*",
              "matchCriteriaId": "4667DAE4-A021-4051-8C6F-AA60597FB575",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:4.0:m1:*:*:*:*:*:*",
              "matchCriteriaId": "43386546-ECB4-4131-A0CA-C9D939C6BD75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:4.0:m2:*:*:*:*:*:*",
              "matchCriteriaId": "6A8490E0-CE6A-453B-9DD6-C2D8A777FC82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:4.0:m3:*:*:*:*:*:*",
              "matchCriteriaId": "D32007B2-74B6-44A3-8C6F-BB4141B6824A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "85EDFA9B-354F-4992-8565-6F39E5AC7EB5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:samsung:galaxy_gear:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B033BF3-3C56-4B7A-92B5-8D1024EB36EE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The SoundServer/FocusServer system services in Tizen allow an unprivileged process to perform media-related system actions, due to improper D-Bus security policy configurations. Such actions include playing an arbitrary sound file or DTMF tones. This affects Tizen before 5.0 M1, and Tizen-based firmwares including Samsung Galaxy Gear series before build RE2."
    },
    {
      "lang": "es",
      "value": "Los servicios de sistema SoundServer/FocusServer en Tizen, permiten a un proceso no privilegiado llevar a cabo acciones del sistema relacionadas con multimedia, debido a configuraciones de pol\u00edtica de seguridad D-Bus inapropiadas. Dichas acciones incluyen la reproducci\u00f3n de un archivo de sonido arbitrario o tonos DTMF. Esto afecta a Tizen versiones anteriores a 5.0 M1 y a los firmwares que se basan ??en Tizen, incluyendo la serie Samsung Galaxy Gear versiones anteriores al build RE2."
    }
  ],
  "id": "CVE-2018-16268",
  "lastModified": "2024-11-21T03:52:25.303",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 3.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-01-22T13:15:10.537",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://review.tizen.org/git/?p=platform/core/multimedia/libmm-sound.git%3Ba=commit%3Bh=7fce6f2d6d480b3bd0e84a5ba3f72173a37e36db"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://review.tizen.org/git/?p=platform/core/multimedia/libmm-sound.git%3Ba=commit%3Bh=7fce6f2d6d480b3bd0e84a5ba3f72173a37e36db"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-269"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-01-22 13:15
Modified
2024-11-21 03:52
Summary
The BlueZ system service in Tizen allows an unprivileged process to partially control Bluetooth or acquire sensitive information, due to improper D-Bus security policy configurations. This affects Tizen before 5.0 M1, and Tizen-based firmwares including Samsung Galaxy Gear series before build RE2.
Impacted products
Vendor Product Version
linux tizen 1.0
linux tizen 1.0
linux tizen 2.0
linux tizen 2.1
linux tizen 2.2
linux tizen 2.2.1
linux tizen 2.3
linux tizen 2.3.1
linux tizen 2.4
linux tizen 3.0
linux tizen 3.0
linux tizen 3.0
linux tizen 4.0
linux tizen 4.0
linux tizen 4.0
linux tizen 5.0
samsung galaxy_gear -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:linux:tizen:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CE14F41-1DA4-4FB3-AC1E-53B38CE81A13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:1.0:m1:*:*:*:*:*:*",
              "matchCriteriaId": "20D9C36E-A873-46A7-A8BA-4A5E0A4BCCA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "394C885B-4641-4AE1-913F-1DE2707897DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C67EE22-0987-4CB5-82C6-18D2AB6D8691",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E7F6A42-2ECF-4948-A31C-F212E4AF0158",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F08ED37-2F08-4663-ADCC-DA8608AFEF68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF125805-DE1F-4791-8B25-3759C00C184E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "44D78961-9103-4C1A-95A7-33CECC3F1172",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A859D388-C803-4562-A83E-89C15AE69F67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8ED4739E-DB36-4298-B6D5-8905B1DB5B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:3.0:m2:*:*:*:*:*:*",
              "matchCriteriaId": "E9F67075-9BCB-4EFF-BE36-790655A96679",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:3.0:m3:*:*:*:*:*:*",
              "matchCriteriaId": "4667DAE4-A021-4051-8C6F-AA60597FB575",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:4.0:m1:*:*:*:*:*:*",
              "matchCriteriaId": "43386546-ECB4-4131-A0CA-C9D939C6BD75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:4.0:m2:*:*:*:*:*:*",
              "matchCriteriaId": "6A8490E0-CE6A-453B-9DD6-C2D8A777FC82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:4.0:m3:*:*:*:*:*:*",
              "matchCriteriaId": "D32007B2-74B6-44A3-8C6F-BB4141B6824A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "85EDFA9B-354F-4992-8565-6F39E5AC7EB5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:samsung:galaxy_gear:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B033BF3-3C56-4B7A-92B5-8D1024EB36EE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The BlueZ system service in Tizen allows an unprivileged process to partially control Bluetooth or acquire sensitive information, due to improper D-Bus security policy configurations. This affects Tizen before 5.0 M1, and Tizen-based firmwares including Samsung Galaxy Gear series before build RE2."
    },
    {
      "lang": "es",
      "value": "El servicio de sistema BlueZ en Tizen, permite a un proceso no privilegiado controlar parcialmente Bluetooth o adquirir informaci\u00f3n confidencial, debido a configuraciones de pol\u00edtica de seguridad D-Bus inapropiadas. Esto afecta a Tizen versiones anteriores a 5.0 M1 y a los firmwares basados ??en Tizen, incluyendo la serie Samsung Galaxy Gear versiones anteriores al build RE2."
    }
  ],
  "id": "CVE-2018-16264",
  "lastModified": "2024-11-21T03:52:24.637",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 3.3,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-01-22T13:15:10.177",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://review.tizen.org/git/?p=platform/upstream/bluez.git%3Ba=commit%3Bh=ff9878c95efc12d4a4495153ab51e3a09f8d3c01"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://review.tizen.org/git/?p=platform/upstream/bluez.git%3Ba=commit%3Bh=ff9878c95efc12d4a4495153ab51e3a09f8d3c01"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-07-08 14:15
Modified
2024-11-21 05:54
Severity ?
Summary
Improper input validation vulnerability in Tizen bootloader prior to Firmware update JUL-2021 Release allows arbitrary code execution using param partition in wireless firmware download mode.
Impacted products
Vendor Product Version
linux tizen *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:linux:tizen:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8A186D7-A9F7-4D4B-9D4F-F3C239695EE9",
              "versionEndExcluding": "5.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper input validation vulnerability in Tizen bootloader prior to Firmware update JUL-2021 Release allows arbitrary code execution using param partition in wireless firmware download mode."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de comprobaci\u00f3n de entrada inapropiada en el cargador de arranque de Tizen anterior a la actualizaci\u00f3n del firmware JUL-2021 Release,, permite una ejecuci\u00f3n de c\u00f3digo arbitrario usando la partici\u00f3n param en el modo de descarga del firmware inal\u00e1mbrico"
    }
  ],
  "id": "CVE-2021-25434",
  "lastModified": "2024-11-21T05:54:58.820",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-07-08T14:15:08.657",
  "references": [
    {
      "source": "mobile.security@samsung.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2021\u0026month=7"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2021\u0026month=7"
    }
  ],
  "sourceIdentifier": "mobile.security@samsung.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "mobile.security@samsung.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-07-08 14:15
Modified
2024-11-21 05:54
Severity ?
Summary
Improper access control vulnerability in Tizen FOTA service prior to Firmware update JUL-2021 Release allows attackers to arbitrary code execution by replacing FOTA update file.
Impacted products
Vendor Product Version
linux tizen *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:linux:tizen:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8A186D7-A9F7-4D4B-9D4F-F3C239695EE9",
              "versionEndExcluding": "5.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper access control vulnerability in Tizen FOTA service prior to Firmware update JUL-2021 Release allows attackers to arbitrary code execution by replacing FOTA update file."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de control de acceso inapropiado en el servicio FOTA de Tizen anterior a la actualizaci\u00f3n de firmware JUL-2021 Release, permite a atacantes una ejecuci\u00f3n de c\u00f3digo arbitrario al reemplazar del archivo de actualizaci\u00f3n FOTA"
    }
  ],
  "id": "CVE-2021-25437",
  "lastModified": "2024-11-21T05:54:59.167",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-07-08T14:15:08.857",
  "references": [
    {
      "source": "mobile.security@samsung.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2021\u0026month=7"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2021\u0026month=7"
    }
  ],
  "sourceIdentifier": "mobile.security@samsung.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "mobile.security@samsung.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-01-22 13:15
Modified
2024-11-21 03:52
Summary
The PulseAudio system service in Tizen allows an unprivileged process to control its A2DP MediaEndpoint, due to improper D-Bus security policy configurations. This affects Tizen before 5.0 M1, and Tizen-based firmwares including Samsung Galaxy Gear series before build RE2.
Impacted products
Vendor Product Version
linux tizen 1.0
linux tizen 1.0
linux tizen 2.0
linux tizen 2.1
linux tizen 2.2
linux tizen 2.2.1
linux tizen 2.3
linux tizen 2.3.1
linux tizen 2.4
linux tizen 3.0
linux tizen 3.0
linux tizen 3.0
linux tizen 4.0
linux tizen 4.0
linux tizen 4.0
linux tizen 5.0
samsung galaxy_gear -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:linux:tizen:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CE14F41-1DA4-4FB3-AC1E-53B38CE81A13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:1.0:m1:*:*:*:*:*:*",
              "matchCriteriaId": "20D9C36E-A873-46A7-A8BA-4A5E0A4BCCA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "394C885B-4641-4AE1-913F-1DE2707897DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C67EE22-0987-4CB5-82C6-18D2AB6D8691",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E7F6A42-2ECF-4948-A31C-F212E4AF0158",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F08ED37-2F08-4663-ADCC-DA8608AFEF68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF125805-DE1F-4791-8B25-3759C00C184E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "44D78961-9103-4C1A-95A7-33CECC3F1172",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A859D388-C803-4562-A83E-89C15AE69F67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8ED4739E-DB36-4298-B6D5-8905B1DB5B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:3.0:m2:*:*:*:*:*:*",
              "matchCriteriaId": "E9F67075-9BCB-4EFF-BE36-790655A96679",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:3.0:m3:*:*:*:*:*:*",
              "matchCriteriaId": "4667DAE4-A021-4051-8C6F-AA60597FB575",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:4.0:m1:*:*:*:*:*:*",
              "matchCriteriaId": "43386546-ECB4-4131-A0CA-C9D939C6BD75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:4.0:m2:*:*:*:*:*:*",
              "matchCriteriaId": "6A8490E0-CE6A-453B-9DD6-C2D8A777FC82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:4.0:m3:*:*:*:*:*:*",
              "matchCriteriaId": "D32007B2-74B6-44A3-8C6F-BB4141B6824A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "85EDFA9B-354F-4992-8565-6F39E5AC7EB5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:samsung:galaxy_gear:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B033BF3-3C56-4B7A-92B5-8D1024EB36EE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The PulseAudio system service in Tizen allows an unprivileged process to control its A2DP MediaEndpoint, due to improper D-Bus security policy configurations. This affects Tizen before 5.0 M1, and Tizen-based firmwares including Samsung Galaxy Gear series before build RE2."
    },
    {
      "lang": "es",
      "value": "El servicio de sistema PulseAudio en Tizen permite a un proceso no privilegiado controlar su A2DP MediaEndpoint, debido a configuraciones incorrectas de la pol\u00edtica de seguridad D-Bus. Esto afecta a Tizen versiones anteriores a 5.0 M1 y a los firmwares basados en Tizen, incluyendo la serie Samsung Galaxy Gear versiones anteriores al build RE2."
    }
  ],
  "id": "CVE-2018-16263",
  "lastModified": "2024-11-21T03:52:24.473",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-01-22T13:15:10.097",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://review.tizen.org/git/?p=platform/upstream/pulseaudio.git%3Ba=commit%3Bh=81e8ba9f3ab0917da4fdfa094f49333be57964c6"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://review.tizen.org/git/?p=platform/upstream/pulseaudio.git%3Ba=commit%3Bh=81e8ba9f3ab0917da4fdfa094f49333be57964c6"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-269"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-01-22 13:15
Modified
2024-11-21 03:52
Summary
The Enlightenment system service in Tizen allows an unprivileged process to fully control or capture windows, due to improper D-Bus security policy configurations. This affects Tizen before 5.0 M1, and Tizen-based firmwares including Samsung Galaxy Gear series before build RE2.
Impacted products
Vendor Product Version
linux tizen 1.0
linux tizen 1.0
linux tizen 2.0
linux tizen 2.1
linux tizen 2.2
linux tizen 2.2.1
linux tizen 2.3
linux tizen 2.3.1
linux tizen 2.4
linux tizen 3.0
linux tizen 3.0
linux tizen 3.0
linux tizen 4.0
linux tizen 4.0
linux tizen 4.0
linux tizen 5.0
samsung galaxy_gear -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:linux:tizen:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CE14F41-1DA4-4FB3-AC1E-53B38CE81A13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:1.0:m1:*:*:*:*:*:*",
              "matchCriteriaId": "20D9C36E-A873-46A7-A8BA-4A5E0A4BCCA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "394C885B-4641-4AE1-913F-1DE2707897DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C67EE22-0987-4CB5-82C6-18D2AB6D8691",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E7F6A42-2ECF-4948-A31C-F212E4AF0158",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F08ED37-2F08-4663-ADCC-DA8608AFEF68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF125805-DE1F-4791-8B25-3759C00C184E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "44D78961-9103-4C1A-95A7-33CECC3F1172",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A859D388-C803-4562-A83E-89C15AE69F67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8ED4739E-DB36-4298-B6D5-8905B1DB5B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:3.0:m2:*:*:*:*:*:*",
              "matchCriteriaId": "E9F67075-9BCB-4EFF-BE36-790655A96679",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:3.0:m3:*:*:*:*:*:*",
              "matchCriteriaId": "4667DAE4-A021-4051-8C6F-AA60597FB575",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:4.0:m1:*:*:*:*:*:*",
              "matchCriteriaId": "43386546-ECB4-4131-A0CA-C9D939C6BD75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:4.0:m2:*:*:*:*:*:*",
              "matchCriteriaId": "6A8490E0-CE6A-453B-9DD6-C2D8A777FC82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:4.0:m3:*:*:*:*:*:*",
              "matchCriteriaId": "D32007B2-74B6-44A3-8C6F-BB4141B6824A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:tizen:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "85EDFA9B-354F-4992-8565-6F39E5AC7EB5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:samsung:galaxy_gear:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B033BF3-3C56-4B7A-92B5-8D1024EB36EE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Enlightenment system service in Tizen allows an unprivileged process to fully control or capture windows, due to improper D-Bus security policy configurations. This affects Tizen before 5.0 M1, and Tizen-based firmwares including Samsung Galaxy Gear series before build RE2."
    },
    {
      "lang": "es",
      "value": "El servicio de sistema Enlightenment en Tizen, permite a un proceso no privilegiado controlar o capturar completamente las ventanas, debido a configuraciones de pol\u00edtica de seguridad D-Bus inapropiadas. Esto afecta a Tizen versiones anteriores a 5.0 M1 y a los firmwares basados ??en Tizen, incluyendo la serie Samsung Galaxy Gear versiones anteriores al build RE2."
    }
  ],
  "id": "CVE-2018-16266",
  "lastModified": "2024-11-21T03:52:24.950",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 8.1,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-01-22T13:15:10.317",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://review.tizen.org/git/?p=platform/upstream/enlightenment.git%3Ba=commit%3Bh=8ff5c24d04f97b1c84b463535876600b22128fb4"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://review.tizen.org/git/?p=platform/upstream/enlightenment.git%3Ba=commit%3Bh=8ff5c24d04f97b1c84b463535876600b22128fb4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.youtube.com/watch?v=3IdgBwbOT-g\u0026feature=youtu.be"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-269"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-07-08 14:15
Modified
2024-11-21 05:54
Summary
Improper authorization vulnerability in Tizen factory reset policy prior to Firmware update JUL-2021 Release allows untrusted applications to perform factory reset using dbus signal.
Impacted products
Vendor Product Version
linux tizen *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:linux:tizen:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8A186D7-A9F7-4D4B-9D4F-F3C239695EE9",
              "versionEndExcluding": "5.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper authorization vulnerability in Tizen factory reset policy prior to Firmware update JUL-2021 Release allows untrusted applications to perform factory reset using dbus signal."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de autorizaci\u00f3n inapropiada en la pol\u00edtica de restablecimiento de f\u00e1brica de Tizen anterior a la actualizaci\u00f3n del firmware JUL-2021 Release,, permite que aplicaciones no confiables lleven a cabo el restablecimiento de f\u00e1brica usando la se\u00f1al dbus"
    }
  ],
  "id": "CVE-2021-25433",
  "lastModified": "2024-11-21T05:54:58.707",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 4.9,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-07-08T14:15:08.587",
  "references": [
    {
      "source": "mobile.security@samsung.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2021\u0026month=7"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2021\u0026month=7"
    }
  ],
  "sourceIdentifier": "mobile.security@samsung.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-285"
        }
      ],
      "source": "mobile.security@samsung.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}