cvelist/2022/39xxx/CVE-2022-39064.json

62 lines
2.5 KiB
JSON
Raw Normal View History

2022-08-31 16:00:35 +00:00
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2022-39064",
2022-10-14 16:00:54 +00:00
"ASSIGNER": "disclosure@synopsys.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Ikea",
"product": {
"product_data": [
{
"product_name": "TR\u00c5DFRI smart lighting system",
"version": {
"version_data": [
{
"version_value": "< 2.0.029 >"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-241: Improper Handling of Unexpected Data Type"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.synopsys.com/blogs/software-security/cyrc-advisory-ikea-tradfri-smart-lighting/",
"refsource": "MISC",
"name": "https://www.synopsys.com/blogs/software-security/cyrc-advisory-ikea-tradfri-smart-lighting/"
}
]
2022-08-31 16:00:35 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2022-10-14 16:00:54 +00:00
"value": "An attacker sending a single malformed IEEE 802.15.4 (Zigbee) frame makes the TR\u00c5DFRI bulb blink, and if they replay (i.e. resend) the same frame multiple times, the bulb performs a factory reset. This causes the bulb to lose configuration information about the Zigbee network and current brightness level. After this attack, all lights are on with full brightness, and a user cannot control the bulbs with either the IKEA Home Smart app or the TR\u00c5DFRI remote control. The malformed Zigbee frame is an unauthenticated broadcast message, which means all vulnerable devices within radio range are affected. CVSS 3.1 Base Score 7.1 vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H"
2022-08-31 16:00:35 +00:00
}
]
}
}