René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

159 lines
4.9 KiB
JSON

{
"id": "CVE-2016-6539",
"sourceIdentifier": "cret@cert.org",
"published": "2018-07-06T21:29:00.280",
"lastModified": "2019-10-09T23:19:12.830",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "The Trackr device ID is constructed of a manufacturer identifier of four zeroes followed by the BLE MAC address in reverse. The MAC address can be obtained by being in close proximity to the Bluetooth device, effectively exposing the device ID. The ID can be used to track devices. Updated apps, version 5.1.6 for iOS and 2.2.5 for Android, have been released by the vendor to address the vulnerabilities in CVE-2016-6538, CVE-2016-6539, CVE-2016-6540 and CVE-2016-6541."
},
{
"lang": "es",
"value": "El ID de los dispositivos Trackr se construye a partir de un identificador del vendedor de cuatro ceros seguido de la direcci\u00f3n MAC BLE al rev\u00e9s. Se puede obtener la direcci\u00f3n MAC estando cerca del dispositivo Bluetooth, exponiendo efectivamente el ID del dispositivo. El ID se puede utilizar para rastrear los dispositivos. El fabricante ha publicado las apps actualizadas (5.1.6 para iOS y 2.2.5 para Android) para solucionar las vulnerabilidades en CVE-2016-6538, CVE-2016-6539, CVE-2016-6540 y CVE-2016-6541."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "ADJACENT_NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3
},
"baseSeverity": "LOW",
"exploitabilityScore": 6.5,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
},
{
"source": "cret@cert.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:thetrackr:trackr_firmware:*:*:*:*:*:android:*:*",
"versionEndExcluding": "2.2.5",
"matchCriteriaId": "43EC4939-50C3-4104-96AB-DEC1FE156EF3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:thetrackr:trackr_firmware:*:*:*:*:*:iphone_os:*:*",
"versionEndExcluding": "5.1.6",
"matchCriteriaId": "8FE04B1C-C57E-478C-8F6A-3C09D344C485"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:thetrackr:trackr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9905EBCF-AAE9-469A-AA16-76C43817F4CD"
}
]
}
]
}
],
"references": [
{
"url": "http://www.securityfocus.com/bid/93874",
"source": "cret@cert.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://blog.rapid7.com/2016/10/25/multiple-bluetooth-low-energy-ble-tracker-vulnerabilities/",
"source": "cret@cert.org",
"tags": [
"Exploit",
"Technical Description",
"Third Party Advisory"
]
},
{
"url": "https://www.kb.cert.org/vuls/id/617567",
"source": "cret@cert.org",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "https://www.kb.cert.org/vuls/id/TNOY-AF3KCZ",
"source": "cret@cert.org",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
}
]
}