cve-2021-3792
Vulnerability from cvelistv5
Published
2021-11-12 22:05
Modified
2024-08-03 17:09
Summary
Some device communications in some Motorola-branded Binatone Hubble Cameras with backend Hubble services are not encrypted which could lead to the communication channel being accessible by an attacker.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T17:09:08.853Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://binatoneglobal.com/security-advisory/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Binatone Hubble Cameras",
          "vendor": "Motorola",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Motorola thanks Lenovo Global Security Lab for reporting these issues."
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Some device communications in some Motorola-branded Binatone Hubble Cameras with backend Hubble services are not encrypted which could lead to the communication channel being accessible by an attacker."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-319",
              "description": "CWE-319 Cleartext Transmission of Sensitive Information",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-12T22:05:51",
        "orgId": "da227ddf-6e25-4b41-b023-0f976dcaca4b",
        "shortName": "lenovo"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://binatoneglobal.com/security-advisory/"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "Update to the camera firmware version (or newer version) indicated in the Product Impact section of the Binatone Security Advisory: https://binatoneglobal.com/security-advisory/."
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@lenovo.com",
          "ID": "CVE-2021-3792",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Binatone Hubble Cameras",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "various"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Motorola"
              }
            ]
          }
        },
        "credit": [
          {
            "lang": "eng",
            "value": "Motorola thanks Lenovo Global Security Lab for reporting these issues."
          }
        ],
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Some device communications in some Motorola-branded Binatone Hubble Cameras with backend Hubble services are not encrypted which could lead to the communication channel being accessible by an attacker."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-319 Cleartext Transmission of Sensitive Information"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://binatoneglobal.com/security-advisory/",
              "refsource": "MISC",
              "url": "https://binatoneglobal.com/security-advisory/"
            }
          ]
        },
        "solution": [
          {
            "lang": "en",
            "value": "Update to the camera firmware version (or newer version) indicated in the Product Impact section of the Binatone Security Advisory: https://binatoneglobal.com/security-advisory/."
          }
        ],
        "source": {
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "da227ddf-6e25-4b41-b023-0f976dcaca4b",
    "assignerShortName": "lenovo",
    "cveId": "CVE-2021-3792",
    "datePublished": "2021-11-12T22:05:51",
    "dateReserved": "2021-09-09T00:00:00",
    "dateUpdated": "2024-08-03T17:09:08.853Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2021-3792\",\"sourceIdentifier\":\"psirt@lenovo.com\",\"published\":\"2021-11-12T22:15:08.420\",\"lastModified\":\"2024-11-21T06:22:26.823\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Some device communications in some Motorola-branded Binatone Hubble Cameras with backend Hubble services are not encrypted which could lead to the communication channel being accessible by an attacker.\"},{\"lang\":\"es\",\"value\":\"Algunas comunicaciones del dispositivo en algunas C\u00e1maras Binatone Hubble de la marca Motorola con los servicios backend Hubble no est\u00e1n encriptadas lo que podr\u00eda conllevar a que el canal de comunicaci\u00f3n fuera accesible por un atacante\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@lenovo.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"psirt@lenovo.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-319\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-319\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:binatoneglobal:halo\\\\+_camera_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"03.50.14\",\"matchCriteriaId\":\"BF4488A5-47D6-41ED-9197-0544B095091A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:binatoneglobal:halo\\\\+_camera:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF35A97E-FD84-471F-BAD5-4E7D1573F89E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:binatoneglobal:comfort_85_connect_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"03.40.02\",\"matchCriteriaId\":\"DAB7C8AB-A62A-4585-B6DA-868AB082542E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:binatoneglobal:comfort_85_connect:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A24AA60-4C10-4D6B-A5A0-2F26C72844E1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:binatoneglobal:mbp3855_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"03.40.00\",\"matchCriteriaId\":\"BCE58D96-4FEC-4214-A164-E5BA7F5B2C29\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:binatoneglobal:mbp3855:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48B956E5-73D0-4286-95B0-BBCFD30E2F4A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:binatoneglobal:focus_68_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0F3F208-93A5-4CFE-9F7B-E768F039C597\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:binatoneglobal:focus_68:v100:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BB7A9FD-152B-4E09-826C-45AF1CAFE105\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:binatoneglobal:focus_68_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0F3F208-93A5-4CFE-9F7B-E768F039C597\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:binatoneglobal:focus_68:v200:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80860B5A-DA27-47AD-83CC-4D8ECE938F05\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:binatoneglobal:focus_72r_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"03.40.00\",\"matchCriteriaId\":\"67C7BE1C-0F3F-4559-9100-94B2213DD516\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:binatoneglobal:focus_72r:v100:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19A8CE00-888A-4A11-BFE2-0A43FFAD7E82\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:binatoneglobal:focus_72r_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"03.40.00\",\"matchCriteriaId\":\"67C7BE1C-0F3F-4559-9100-94B2213DD516\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:binatoneglobal:focus_72r:v200:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09EF4092-FBBF-4CC1-9DE6-4E7914BB7D9F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:binatoneglobal:cn28_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE722C2E-B7D0-44DA-A494-030B6A8CE465\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:binatoneglobal:cn28:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEFB40A7-64F5-4057-A1C7-483D809F4DC9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:binatoneglobal:cn50_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39A98169-B314-4C02-B936-ECCC6A224CE1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:binatoneglobal:cn50:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35A2752F-B339-4B61-874E-FDB063EE7468\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:binatoneglobal:comfort_40_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34F7D5B9-C1A9-484E-8339-AA2199FD2097\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:binatoneglobal:comfort_40:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86D5680E-9746-405F-B257-6BE5F9457250\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:binatoneglobal:comfort_50_connect_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5136037-CAE0-4C43-92B6-ED95D9D88EF3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:binatoneglobal:comfort_50_connect:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"711AD353-9CC1-40F5-A4BB-6ED9C0EB4436\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:binatoneglobal:mbp4855_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E41C52F-8993-42EC-A7E7-21830663496B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:binatoneglobal:mbp4855:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62B80F89-A9CA-4CEA-8091-593FE73CA1DA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:binatoneglobal:mbp3667_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88CFF394-3622-4E86-BC47-D1050456FB66\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:binatoneglobal:mbp3667:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96B06D2A-47A5-421F-980F-3E31AF89C4AA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:binatoneglobal:mbp669_connect_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F6BDA58-E9FD-4A4D-AC45-8E62C778247B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:binatoneglobal:mbp669_connect:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C01867E5-A3D4-486B-A49B-1A34E5AB61A9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:binatoneglobal:lux_64_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13AC5EE6-C75D-46A5-A235-F653E7ABB6E0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:binatoneglobal:lux_64:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AE5C627-EDAB-4407-90C9-299C2E11969B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:binatoneglobal:lux_65_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00E8AB8F-165B-4810-B52B-19B9B1BAD286\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:binatoneglobal:lux_65:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D58F7A0E-6009-4D51-96B3-21774E94A4B5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:binatoneglobal:connect_view_65_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"019A6C5F-61C5-48F6-B036-372347CB3EFA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:binatoneglobal:connect_view_65:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CED7B6B-A318-4956-8E9E-7E9F333F6849\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:binatoneglobal:lux_85_connect_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99E734BF-B4FB-46D4-B7D1-D1FBC4D8F59C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:binatoneglobal:lux_85_connect:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBB23100-4786-4343-97A6-BEE11176B730\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:binatoneglobal:ease44_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB6A5A5B-2E32-41D4-8077-0146ED2D5015\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:binatoneglobal:ease44:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D8383CE-EFC9-48DF-98B5-25B37630EBB8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:binatoneglobal:connect_20_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A367895E-0D4A-4634-97C1-AEEB4266D3D9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:binatoneglobal:connect_20:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"496B82F4-9CBB-4F9D-9DFD-DFC1B21D3A7E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:binatoneglobal:mbp6855_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DEB4430-4E36-4D7E-800E-FFC81CA805FC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:binatoneglobal:mbp6855:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DAAE13D-6EB2-4029-BC47-2E5D1F490FF2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:binatoneglobal:cn40_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC267B84-161F-4EE2-8E72-4820F7175B96\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:binatoneglobal:cn40:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9316C7C-2041-4A1B-A296-4C06DB5E9F89\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:binatoneglobal:cn75_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D7AA6CF-7FEE-4ACE-9BD8-383BA30CCB3A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:binatoneglobal:cn75:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00550EB3-E556-48AE-95FA-84F8B0E177C6\"}]}]}],\"references\":[{\"url\":\"https://binatoneglobal.com/security-advisory/\",\"source\":\"psirt@lenovo.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://binatoneglobal.com/security-advisory/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.