2025-03-21 15:03:52 +00:00

64 lines
2.3 KiB
JSON

{
"id": "CVE-2025-30113",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-18T15:16:02.453",
"lastModified": "2025-03-21T14:15:17.210",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered on the Forvia Hella HELLA Driving Recorder DR 820. Hardcoded Credentials exist in the APK for Ports 9091 and 9092. The dashcam's Android application contains hardcoded credentials that allow unauthorized access to device settings through ports 9091 and 9092. These credentials, stored in cleartext, can be exploited by an attacker who gains access to the dashcam's network."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en Forvia Hella HELLA Driving Recorder DR 820. Existen credenciales codificadas en el APK para los puertos 9091 y 9092. La aplicaci\u00f3n Android de dashcam contiene credenciales codificadas que permiten el acceso no autorizado a la configuraci\u00f3n del dispositivo a trav\u00e9s de los puertos 9091 y 9092. Estas credenciales, almacenadas en texto plano, pueden ser explotadas por un atacante que obtenga acceso a la red de dashcam."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
}
],
"references": [
{
"url": "https://github.com/geo-chen/Hella",
"source": "cve@mitre.org"
},
{
"url": "https://medium.com/@geochen/cve-draft-hella-driving-recorder-dr-820-ff8c4e2cca26",
"source": "cve@mitre.org"
}
]
}