fkie_cve-2020-5571
Vulnerability from fkie_nvd
Published
2020-04-23 08:15
Modified
2024-11-21 05:34
Summary
SHARP AQUOS series (AQUOS SH-M02 build number 01.00.05 and earlier, AQUOS SH-RM02 build number 01.00.04 and earlier, AQUOS mini SH-M03 build number 01.00.04 and earlier, AQUOS Keitai SH-N01 build number 01.00.01 and earlier, AQUOS L2 (UQ mobile/J:COM) build number 01.00.05 and earlier, AQUOS sense lite SH-M05 build number 03.00.04 and earlier, AQUOS sense (UQ mobile) build number 03.00.03 and earlier, AQUOS compact SH-M06 build number 02.00.02 and earlier, AQUOS sense plus SH-M07 build number 02.00.02 and earlier, AQUOS sense2 SH-M08 build number 02.00.05 and earlier, and AQUOS sense2 (UQ mobile) build number 02.00.06 and earlier) allow an attacker to obtain the sensitive information of the device via malicious applications installed on the device.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sharp:aquos_sh-m02_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FD59544-20A6-48D8-AE3E-07E4E2DB1B8E",
              "versionEndIncluding": "01.00.05",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sharp:aquos_sh-m02:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E89B46A-AED5-485F-A421-27A1F6858AE2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sharp:aquos_sh-rm02_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D494A126-5A45-43F0-8B91-9C485E4140B7",
              "versionEndIncluding": "01.00.04",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sharp:aquos_sh-rm02:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D692574-174F-45B9-B9DC-2B648B46A20F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sharp:aquos_mini_sh-m03_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "12BF766E-4616-4D6C-B0C0-B5091CB29C77",
              "versionEndIncluding": "01.00.04",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sharp:aquos_mini_sh-m03:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED345507-6D48-4834-B3E4-0FC334743C60",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sharp:aquos_mini_sh-m03_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "938A6C88-A808-45A0-850B-BE3D92B86647",
              "versionEndIncluding": "01.00.01",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sharp:aquos_mini_sh-m03:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED345507-6D48-4834-B3E4-0FC334743C60",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sharp:aquos_l2_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0CCB54C-25EC-49AC-84F2-59B99E85557A",
              "versionEndIncluding": "01.00.05",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sharp:aquos_l2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "876398B9-E348-46BF-9BA5-7E5EF8EC3E71",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sharp:aquos_sense_lite_sh-m05_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FEECD7B-7D92-4065-A03F-568FF98F078A",
              "versionEndIncluding": "03.00.04",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sharp:aquos_sense_lite_sh-m05:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2E9A50C-C4EF-4164-80E5-3145E762DB4F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sharp:aquos_sense_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2422A18E-EE73-4671-99AD-4DB32B06B107",
              "versionEndIncluding": "03.00.03",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sharp:aquos_sense:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89A05AEE-D061-403B-9940-E8C715AA610F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sharp:aquos_compact_sh-m06_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CB139D3-98EB-4EBA-99D5-3B07E1BA5E36",
              "versionEndIncluding": "02.00.02",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sharp:aquos_compact_sh-m06:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "22B966CF-90A4-4332-817F-9C71DC414FEE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sharp:aquos_sense_plus_sh-m07_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AEE981C-D7BC-446B-9847-61C1C3DE3E54",
              "versionEndIncluding": "0.2.00.02",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sharp:aquos_sense_plus_sh-m07:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9BE91BA-6C58-42AC-A7F1-EA6E06B35C2F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sharp:aquos_sense2_sh-m08_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1D50AB6-954E-4E61-953F-C5C0B1571EA1",
              "versionEndIncluding": "02.00.05",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sharp:aquos_sense2_sh-m08:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D666BE3-6407-421A-B10A-4D336D069C3E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sharp:aquos_sense2_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0D366A8-6304-4564-A804-B367E0AF9B29",
              "versionEndIncluding": "02.00.06",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sharp:aquos_sense2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2C7613D-2BAB-44E1-8F7F-14223425AFAC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SHARP AQUOS series (AQUOS SH-M02 build number 01.00.05 and earlier, AQUOS SH-RM02 build number 01.00.04 and earlier, AQUOS mini SH-M03 build number 01.00.04 and earlier, AQUOS Keitai SH-N01 build number 01.00.01 and earlier, AQUOS L2 (UQ mobile/J:COM) build number 01.00.05 and earlier, AQUOS sense lite SH-M05 build number 03.00.04 and earlier, AQUOS sense (UQ mobile) build number 03.00.03 and earlier, AQUOS compact SH-M06 build number 02.00.02 and earlier, AQUOS sense plus SH-M07 build number 02.00.02 and earlier, AQUOS sense2 SH-M08 build number 02.00.05 and earlier, and AQUOS sense2 (UQ mobile) build number 02.00.06 and earlier) allow an attacker to obtain the sensitive information of the device via malicious applications installed on the device."
    },
    {
      "lang": "es",
      "value": "La serie SHARP AQUOS (AQUOS SH-M02 AQUOS SH-M02 n\u00famero de compilaci\u00f3n 01.00.05 y anteriores, AQUOS SH-RM02 n\u00famero de compilaci\u00f3n 01.00.04 y anteriores, AQUOS mini SH-M03 n\u00famero de compilaci\u00f3n 01.00.04 y anteriores, AQUOS Keitai n\u00famero de compilaci\u00f3n SH-N01 01.00. 01 y anteriores, AQUOS L2 (UQ mobile/J:COM) n\u00famero de compilaci\u00f3n 01.00.05 y anteriores, AQUOS sense lite SH-M05 n\u00famero de compilaci\u00f3n 03.00.04 y anteriores, AQUOS sense (UQ mobile) n\u00famero de compilaci\u00f3n 03.00.03 y anteriores, AQUOS compact SH-M06 n\u00famero de compilaci\u00f3n 02.00.02 y anteriores, AQUOS sense plus SH-M07 n\u00famero de compilaci\u00f3n 02.00.02 y anteriores, AQUOS sense2 SH-M08 n\u00famero de compilaci\u00f3n 02.00.05 y anteriores, y AQUOS sense2 (UQ mobile) n\u00famero de compilaci\u00f3n 02.00 .06 y anteriores), permiten a un atacante obtener informaci\u00f3n confidencial del dispositivo por medio de aplicaciones maliciosas instaladas en el dispositivo."
    }
  ],
  "id": "CVE-2020-5571",
  "lastModified": "2024-11-21T05:34:17.607",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-04-23T08:15:12.067",
  "references": [
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://jvn.jp/en/jp/JVN93064451/index.html"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://k-tai.sharp.co.jp/support/info/info036.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://jvn.jp/en/jp/JVN93064451/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://k-tai.sharp.co.jp/support/info/info036.html"
    }
  ],
  "sourceIdentifier": "vultures@jpcert.or.jp",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…