310 lines
10 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2018-14825",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2018-09-24T19:29:00.507",
"lastModified": "2019-10-09T23:35:17.530",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "On Honeywell Mobile Computers (CT60 running Android OS 7.1, CN80 running Android OS 7.1, CT40 running Android OS 7.1, CK75 running Android OS 6.0, CN75 running Android OS 6.0, CN75e running Android OS 6.0, CT50 running Android OS 6.0, D75e running Android OS 6.0, CT50 running Android OS 4.4, D75e running Android OS 4.4, CN51 running Android OS 6.0, EDA50k running Android 4.4, EDA50 running Android OS 7.1, EDA50k running Android OS 7.1, EDA70 running Android OS 7.1, EDA60k running Android OS 7.1, and EDA51 running Android OS 8.1), a skilled attacker with advanced knowledge of the target system could exploit this vulnerability by creating an application that would successfully bind to the service and gain elevated system privileges. This could enable the attacker to obtain access to keystrokes, passwords, personal identifiable information, photos, emails, or business-critical documents."
},
{
"lang": "es",
"value": "En Honeywell Mobile Computers (CT60 con Android OS 7.1, CN80 con Android OS 7.1, CT40 con Android OS 7.1, CK75 con Android OS 6.0, CN75 con Android OS 6.0, CN75e con Android OS 6.0, CT50 con Android OS 6.0, D75e con Android OS 6.0, CT50 con Android OS 4.4, D75e con Android OS 4.4, CN51 con Android OS 6.0, EDA50k con Android 4.4, EDA50 con Android OS 7.1, EDA50k con Android OS 7.1, EDA70 con Android OS 7.1, EDA60k con Android OS 7.1 y EDA51 con Android OS 8.1), un atacante habilidoso con conocimientos avanzados del sistema objetivo podr\u00eda explotar esta vulnerabilidad creando una aplicaci\u00f3n que se enlazar\u00eda exitosamente al servicio y obtendr\u00eda privilegios elevados en el sistema. Esto podr\u00eda permitir que el atacante obtenga acceso a las pulsaciones de teclas, contrase\u00f1as, informaci\u00f3n personal identificable, fotograf\u00edas, emails o documentos cr\u00edticos para una empresa."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH",
"baseScore": 5.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.0,
"impactScore": 4.7
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-732"
}
]
},
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:h:honeywell:cn80:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D1D869B3-0F99-4B0B-8D45-A2CC49FD34B8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:honeywell:ct40:-:*:*:*:*:*:*:*",
"matchCriteriaId": "41E581B1-2DF5-4976-A98D-86410DC093FE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:honeywell:ct60:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F2DFDCE6-48B4-43B2-8A4C-EBBD009F1D35"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:honeywell:eda50:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF7F4ED7-2E7A-469A-AF94-1D777BC524BB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:honeywell:eda50k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2F6DCB47-E75C-4493-AEFC-AA85CF6D1911"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:honeywell:eda60k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "16F1DC1D-8A7C-49FC-BC3F-9E8E8C6E76EB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:honeywell:eda70:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9D21E5A7-4167-4DD2-B3D4-8911EBCA6168"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:google:android:7.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FC30B2A2-9674-4052-B402-20348E50F9E8"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:h:honeywell:ck75:-:*:*:*:*:*:*:*",
"matchCriteriaId": "69EF9A2F-B102-4115-85A3-EE5C21C0169B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:honeywell:cn51:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72A6CB80-88B2-4DEB-8912-236C6FABF90B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:honeywell:cn75:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C6BBD6E9-0540-4263-BA52-019E5BB51ABA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:honeywell:cn75e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AD4A2025-004B-448C-87E1-B432C77AE2E4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:honeywell:d75e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4FD442EE-7AC6-4D4C-8862-5CA6F731DBC7"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E70C6D8D-C9C3-4D92-8DFC-71F59E068295"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:h:honeywell:ct50:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C29434F4-0DB7-4CDD-A37E-54CB227B4C39"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:honeywell:d75e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4FD442EE-7AC6-4D4C-8862-5CA6F731DBC7"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "98C32982-095C-4628-9958-118A3D3A9CAA"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E70C6D8D-C9C3-4D92-8DFC-71F59E068295"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:h:honeywell:eda50k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2F6DCB47-E75C-4493-AEFC-AA85CF6D1911"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "98C32982-095C-4628-9958-118A3D3A9CAA"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:h:honeywell:eda51:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B51B9958-2621-4403-B59C-703538E8321E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B06BE74B-83F4-41A3-8AD3-2E6248F7B0B2"
}
]
}
]
}
],
"references": [
{
"url": "http://www.securityfocus.com/bid/105767",
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://cert.vde.com/de-de/advisories/vde-2018-016",
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-256-01",
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
}
]
}