René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

135 lines
4.1 KiB
JSON

{
"id": "CVE-2018-7580",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-12-21T21:15:12.603",
"lastModified": "2022-08-06T03:45:58.647",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Philips Hue is vulnerable to a Denial of Service attack. Sending a SYN flood on port tcp/80 will freeze Philips Hue's hub and it will stop responding. The \"hub\" will stop operating and be frozen until the flood stops. During the flood, the user won't be able to turn on/off the lights, and all of the hub's functionality will be unresponsive. The cloud service also won't work with the hub."
},
{
"lang": "es",
"value": "Philips Hue es vulnerable a un ataque de Denegaci\u00f3n de Servicio. El env\u00edo de una inundaci\u00f3n de SYN en el puerto tcp/80 congelar\u00e1 el concentrador de Philips Hue y dejar\u00e1 de responder. El \"hub\" dejar\u00e1 de funcionar y se congelar\u00e1 hasta que se detenga la inundaci\u00f3n. Durante la inundaci\u00f3n, el usuario no podr\u00e1 encender y apagar las luces y todas las funciones del hub dejar\u00e1n de responder. El servicio en la nube tampoco funcionar\u00e1 con el concentrador"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:philips:hue_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B32AC3EA-32D2-4DEC-A8D6-82377AB577B3"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:philips:hue:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E0889CD2-2331-4391-A187-CC64813896DA"
}
]
}
]
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/160724/Philips-Hue-Denial-Of-Service.html",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://seclists.org/fulldisclosure/2020/Dec/51",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://www.iliashn.com/CVE-2018-7580/",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}