cvelist/2025/32xxx/CVE-2025-32886.json

81 lines
2.5 KiB
JSON
Raw Normal View History

2025-04-12 00:00:31 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
2025-05-01 18:00:35 +00:00
"ID": "CVE-2025-32886",
"STATE": "PUBLIC"
2025-04-12 00:00:31 +00:00
},
2025-05-01 18:00:35 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2025-04-12 00:00:31 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2025-05-01 18:00:35 +00:00
"value": "An issue was discovered on goTenna v1 devices with app 5.5.3 and firmware 0.25.5. All packets sent over RF are also sent over UART with USB Shell, allowing someone with local access to gain information about the protocol and intercept sensitive data."
2025-04-12 00:00:31 +00:00
}
]
2025-05-01 18:00:35 +00:00
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://gotenna.com",
"refsource": "MISC",
"name": "https://gotenna.com"
},
{
"refsource": "MISC",
"name": "https://github.com/Dollarhyde/goTenna_v1_and_Mesh_vulnerabilities",
"url": "https://github.com/Dollarhyde/goTenna_v1_and_Mesh_vulnerabilities"
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AC:L/AV:L/A:N/C:L/I:N/PR:N/S:U/UI:N",
"version": "3.1"
}
2025-04-12 00:00:31 +00:00
}
}