cvelist/2020/16xxx/CVE-2020-16170.json

67 lines
2.1 KiB
JSON
Raw Normal View History

2020-07-30 21:01:24 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
2020-08-11 20:01:36 +00:00
"ID": "CVE-2020-16170",
"STATE": "PUBLIC"
2020-07-30 21:01:24 +00:00
},
2020-08-11 20:01:36 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2020-07-30 21:01:24 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2020-09-02 19:01:41 +00:00
"value": "Use of Hard-coded Credentials in temi Robox OS prior to 120, temi Android app up to 1.3.7931 allows remote attackers to listen in on any ongoing calls between temi robots and their users if they can brute-force/guess a six-digit value via unspecified vectors."
2020-08-11 20:01:36 +00:00
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.robotemi.com/software-updates/",
"refsource": "MISC",
"name": "https://www.robotemi.com/software-updates/"
},
{
"refsource": "MISC",
"name": "https://www.mcafee.com/blogs/other-blogs/mcafee-labs/call-an-exorcist-my-robots-possessed/",
"url": "https://www.mcafee.com/blogs/other-blogs/mcafee-labs/call-an-exorcist-my-robots-possessed/"
2020-07-30 21:01:24 +00:00
}
]
}
}