{"vulnerability": "CVE-2024-3655", "sightings": [{"uuid": "29a0ebad-9de2-4a66-8969-ef4c30703a36", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36556", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhjqsucmou2v", "content": "", "creation_timestamp": "2025-02-06T18:48:57.605746Z"}, {"uuid": "3058f373-035d-48bc-b3e6-57ad26bf86b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36555", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhjqsunmdt22", "content": "", "creation_timestamp": "2025-02-06T18:48:59.433551Z"}, {"uuid": "913f14b8-f434-4d65-8239-49edd4af0979", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36553", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113958119408765850", "content": "", "creation_timestamp": "2025-02-06T17:28:26.575282Z"}, {"uuid": "bc4bc2bd-0de3-462c-bc3e-ee14a0a65624", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36554", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113958148746207608", "content": "", "creation_timestamp": "2025-02-06T17:35:54.136088Z"}, {"uuid": "928f9fd7-5120-4897-8f72-bcfb5a121f4c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36555", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113958148780874756", "content": "", "creation_timestamp": "2025-02-06T17:35:54.534932Z"}, {"uuid": "0da98a27-0929-49fe-8131-d814269c3c4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36556", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113958148795387901", "content": "", "creation_timestamp": "2025-02-06T17:35:54.884613Z"}, {"uuid": "d9879af3-1dae-4665-acd8-7fe26a739ada", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36557", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113958148829513343", "content": "", "creation_timestamp": "2025-02-06T17:35:55.372728Z"}, {"uuid": "b19a420b-8228-46dd-9a64-cc8c51e3fc40", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36554", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113958163944157698", "content": "", "creation_timestamp": "2025-02-06T17:39:46.092644Z"}, {"uuid": "c61544cd-96d0-4885-bc9a-5119c87aff8e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36556", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113958163999249588", "content": "", "creation_timestamp": "2025-02-06T17:39:46.992951Z"}, {"uuid": "c7a8f312-051c-420a-a7d2-8653f77d26b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36555", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113958163964260629", "content": "", "creation_timestamp": "2025-02-06T17:39:46.515440Z"}, {"uuid": "a53d7671-a27b-42a5-815f-1cf0f6aa0f57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36557", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113958164013597777", "content": "", "creation_timestamp": "2025-02-06T17:39:47.113565Z"}, {"uuid": "eb3bd063-5112-4937-9f8f-29208457d585", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36553", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhjoyjjft62x", "content": "", "creation_timestamp": "2025-02-06T18:16:18.130439Z"}, {"uuid": "60f5adcc-6a1e-4d12-8f83-4018d4753713", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36554", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhjoyluj5k22", "content": "", "creation_timestamp": "2025-02-06T18:16:20.696740Z"}, {"uuid": "db66d416-87a6-47f4-b7f3-42b9e5efb81a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36557", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhjoyt4kw52s", "content": "", "creation_timestamp": "2025-02-06T18:16:28.407127Z"}, {"uuid": "5fc2269d-249e-4386-b7bf-71f16a411421", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36558", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhjoyvf64t2v", "content": "", "creation_timestamp": "2025-02-06T18:16:30.411265Z"}, {"uuid": "264063e1-ef90-4d87-9b73-af65885890ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36555", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhjoynywm222", "content": "", "creation_timestamp": "2025-02-06T18:16:23.601148Z"}, {"uuid": "04335678-68d7-415e-b656-ccdb4c7eba14", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36556", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhjoyr27ts2q", "content": "", "creation_timestamp": "2025-02-06T18:16:26.165933Z"}, {"uuid": "93bd40a2-5198-413b-ae19-0072385be5ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36558", "type": "seen", "source": "https://t.me/cvedetector/17406", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-36558 - Forever KidsWatch Call Me KW-50 R36 Vulnerability: Cleartext Transmission of Sensitive Information\", \n  \"Content\": \"CVE ID : CVE-2024-36558 \nPublished : Feb. 6, 2025, 6:15 p.m. | 25\u00a0minutes ago \nDescription : Forever KidsWatch Call Me KW-50 R36_YDR_A3PW_GM7S_V1.0_2019_07_15_16.19.24_cob_h suffers from Cleartext Transmission of Sensitive Information due to lack of encryption in device-server communication. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-06T20:15:00.000000Z"}, {"uuid": "a001bef1-2210-482a-b5cf-1cfc5cc508aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36554", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhjqsuue522p", "content": "", "creation_timestamp": "2025-02-06T18:49:00.659813Z"}, {"uuid": "c2697c91-9931-4b9e-b364-bb350c116d56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36556", "type": "seen", "source": "https://t.me/cvedetector/17404", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-36556 - \"Forever KidsWatch Call Me KW Series Hardcoded Password Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-36556 \nPublished : Feb. 6, 2025, 6:15 p.m. | 25\u00a0minutes ago \nDescription : Forever KidsWatch Call Me KW50 R36_YDR_A3PW_GM7S_V1.0_2019_07_15_16.19.24_cob_h, and Forever KidsWatch Call Me 2 KW60 R36CW_YDE_S4_A29_2_V1.0_2023.05.24_22.49.44_cob_b have a Hardcoded password vulnerability. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-06T20:14:58.000000Z"}, {"uuid": "02686798-511e-4722-af68-7a391ddbd95c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36555", "type": "seen", "source": "https://t.me/cvedetector/17403", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-36555 - Forever KidsWatch Call Me IMEI Spoofing Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-36555 \nPublished : Feb. 6, 2025, 6:15 p.m. | 25\u00a0minutes ago \nDescription : Built-in SMS-configuration command in Forever KidsWatch Call Me KW50 R36_YDR_A3PW_GM7S_V1.0_2019_07_15_16.19.24_cob_h and Forever KidsWatch Call Me 2 KW-60 R36CW_YDE_S4_A29_2_V1.0_2023.05.24_22.49.44_cob_b allows malicious users to change the device IMEI-number which allows for forging the identity of the device. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-06T20:14:57.000000Z"}, {"uuid": "609838ba-cbe9-41a4-ba5c-563cf1c0fd45", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36554", "type": "seen", "source": "https://t.me/cvedetector/17402", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-36554 - Forever KidsWatch Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-36554 \nPublished : Feb. 6, 2025, 6:15 p.m. | 25\u00a0minutes ago \nDescription : Forever KidsWatch Call Me KW-50 R36_YDR_A3PW_GM7S_V1.0_2019_07_15_16.19.24_cob_h and Forever KidsWatch Call Me KW-60 R36CW_YDE_S4_A29_2_V1.0_2023.05.24_22.49.44_cob_b allow a malicious user to gain information about the device by sending an SMS to the device which returns sensitive information. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-06T20:14:56.000000Z"}, {"uuid": "69835bd6-c58c-4ed5-b937-9703ab06c9f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36553", "type": "seen", "source": "https://t.me/cvedetector/17401", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-36553 - Forever KidsWatch Call Me KW-50 RNS MITM Attack\", \n  \"Content\": \"CVE ID : CVE-2024-36553 \nPublished : Feb. 6, 2025, 6:15 p.m. | 25\u00a0minutes ago \nDescription : Forever KidsWatch Call Me KW-50 R36_YDR_A3PW_GM7S_V1.0_2019_07_15_16.19.24_cob_h is vulnerable to MITM attack. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-06T20:14:53.000000Z"}, {"uuid": "4f96f2de-be44-47b4-a85b-e6b1dd423571", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36557", "type": "seen", "source": "https://t.me/cvedetector/17405", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-36557 - Forever KidsWatch IMEI Hijacking Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-36557 \nPublished : Feb. 6, 2025, 6:15 p.m. | 25\u00a0minutes ago \nDescription : The device ID is based on IMEI in Forever KidsWatch Call Me KW50 R36_YDR_A3PW_GM7S_V1.0_2019_07_15_16.19.24_cob_h and Forever KidsWatch Call Me 2 KW60 R36CW_YDE_S4_A29_2_V1.0_2023.05.24_22.49.44_cob_b. If a malicious user changes the IMEI to the IMEI of a unit they registered in the mobile app, it is possible to hijack the device and control it from the app. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-06T20:14:59.000000Z"}, {"uuid": "00de30ca-0fb3-4ee5-9d05-c524dff62302", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3655", "type": "seen", "source": "https://t.me/cvedetector/4675", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-3655 - Arm Bifrost/Valhall/5th Gen GPU Architecture After Free Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-3655 \nPublished : Sept. 3, 2024, 10:15 a.m. | 51\u00a0minutes ago \nDescription : Use After Free vulnerability in Arm Ltd Bifrost GPU Kernel Driver, Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver allows a local non-privileged user to make improper GPU memory processing operations to gain access to already freed memory.This issue affects Bifrost GPU Kernel Driver: from r43p0 through r49p0; Valhall GPU Kernel Driver: from r43p0 through r49p0; Arm 5th Gen GPU Architecture Kernel Driver: from r43p0 through r49p0. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-03T13:17:38.000000Z"}, {"uuid": "c375076f-efbd-483d-afb8-a4f7668065c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36558", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/3826", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-36558\n\ud83d\udd25 CVSS Score: 7.5 (CVSS_V3)\n\ud83d\udd39 Description: Forever KidsWatch Call Me KW-50 R36_YDR_A3PW_GM7S_V1.0_2019_07_15_16.19.24_cob_h suffers from Cleartext Transmission of Sensitive Information due to lack of encryption in device-server communication.\n\ud83d\udccf Published: 2025-02-06T18:31:06Z\n\ud83d\udccf Modified: 2025-02-07T18:31:19Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-36558\n2. https://www.diva-portal.org/smash/record.jsf?aq2=%5B%5B%5D%5D&amp;c=1&amp;af=%5B%5D&amp;searchType=SIMPLE&amp;sortOrder2=title_sort_asc&amp;query=Exploiting+Vulnerabilities+to+Remotely+Hijack+Children%E2%80%99s+Smartwatches&amp;language=en&amp;pid=diva2%3A1933447&amp;aq=%5B%5B%5D%5D&amp;sf=undergraduate&amp;aqe=%5B%5D&amp;sortOrder=author_sort_asc&amp;onlyFullText=false&amp;noOfRows=50&amp;dswid=-8296", "creation_timestamp": "2025-02-07T19:04:45.000000Z"}]}