mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
64 lines
2.7 KiB
JSON
64 lines
2.7 KiB
JSON
{
|
|
"id": "CVE-2024-40892",
|
|
"sourceIdentifier": "disclosure@vulncheck.com",
|
|
"published": "2024-08-12T19:15:16.403",
|
|
"lastModified": "2024-08-21T18:15:09.710",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "A weak credential vulnerability exists in Firewalla Box Software versions before 1.979. This vulnerability allows a physically close attacker to use the license UUID for authentication and provision SSH credentials over the Bluetooth Low-Energy (BTLE) interface. Once an attacker gains access to the LAN, they could log into the SSH interface using the provisioned credentials. The license UUID can be acquired through plain-text Bluetooth sniffing, reading the QR code on the bottom of the device, or brute-forcing the UUID (though this is less likely)."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Existe una vulnerabilidad de credencial d\u00e9bil en las versiones del software Firewalla Box anteriores a la 1.979. Esta vulnerabilidad permite que un atacante f\u00edsicamente cercano use el UUID de licencia para autenticaci\u00f3n y proporcione credenciales SSH a trav\u00e9s de la interfaz Bluetooth Low-Energy (BTLE). Una vez que un atacante obtiene acceso a la LAN, puede iniciar sesi\u00f3n en la interfaz SSH utilizando las credenciales proporcionadas. El UUID de licencia se puede adquirir mediante el rastreo de texto plano de Bluetooth, la lectura del c\u00f3digo QR en la parte inferior del dispositivo o la fuerza bruta del UUID (aunque esto es menos probable)."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "disclosure@vulncheck.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"attackVector": "ADJACENT_NETWORK",
|
|
"attackComplexity": "HIGH",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 7.1,
|
|
"baseSeverity": "HIGH"
|
|
},
|
|
"exploitabilityScore": 1.2,
|
|
"impactScore": 5.9
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "disclosure@vulncheck.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-1391"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://vulncheck.com/advisories/firewalla-bt-weak-credentials",
|
|
"source": "disclosure@vulncheck.com"
|
|
},
|
|
{
|
|
"url": "https://www.labs.greynoise.io/grimoire/2024-08-20-bluuid-firewalla/",
|
|
"source": "disclosure@vulncheck.com"
|
|
}
|
|
]
|
|
} |