2024-12-08 03:06:42 +00:00

64 lines
2.0 KiB
JSON

{
"id": "CVE-2024-48544",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-24T17:15:17.257",
"lastModified": "2024-10-25T12:56:07.750",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect access control in the firmware update and download processes of Sylvania Smart Home v3.0.3 allows attackers to access sensitive information by analyzing the code and data within the APK file."
},
{
"lang": "es",
"value": "El control de acceso incorrecto en los procesos de actualizaci\u00f3n y descarga de firmware de Sylvania Smart Home v3.0.3 permite a los atacantes acceder a informaci\u00f3n confidencial mediante el an\u00e1lisis del c\u00f3digo y los datos dentro del archivo APK."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.4,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "http://sylvania.com",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/HankJames/Vul-Reports/blob/main/FirmwareLeakage/com.ledvance.smartplus/com.ledvance.smartplus.md",
"source": "cve@mitre.org"
}
]
}