cvelist/2018/4xxx/CVE-2018-4028.json

70 lines
2.3 KiB
JSON
Raw Normal View History

2018-01-02 17:05:29 -05:00
{
2019-05-13 16:00:51 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
2019-03-18 00:21:14 +00:00
"CVE_data_meta": {
"ID": "CVE-2018-4028",
2019-05-13 16:00:51 +00:00
"ASSIGNER": "talos-cna@cisco.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Novatek",
"version": {
"version_data": [
{
"version_value": "Anker Roav A1 Dashcam RoavA1SWV1.9"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Incorrect Default Permissions"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0700",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0700"
}
]
2019-03-18 00:21:14 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2019-05-13 16:00:51 +00:00
"value": "An exploitable firmware update vulnerability exists in the NT9665X Chipset firmware running on the Anker Roav A1 Dashcam, version RoavA1SWV1.9. The HTTP server could allow an attacker to overwrite the root directory of the server, resulting in a denial of service. An attacker can send an HTTP POST request to trigger this vulnerability."
2019-03-18 00:21:14 +00:00
}
]
2022-04-19 13:59:15 -04:00
},
"impact": {
"cvss": {
"baseScore": 5.3,
"baseSeverity": "Medium",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
}
2019-03-18 00:21:14 +00:00
}
}