2025-03-22 17:03:50 +00:00

64 lines
2.2 KiB
JSON

{
"id": "CVE-2025-26408",
"sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf",
"published": "2025-02-11T10:15:09.617",
"lastModified": "2025-03-22T15:15:38.687",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The JTAG interface of Wattsense Bridge devices can be accessed with physical access to the PCB. After connecting to the interface, full access to the device is possible. This enables an attacker to extract information, modify and debug the device's firmware. All known versions are affected."
},
{
"lang": "es",
"value": "Se puede acceder a la interfaz JTAG de los dispositivos Wattsense Bridge mediante acceso f\u00edsico a la PCB. Despu\u00e9s de conectarse a la interfaz, es posible acceder por completo al dispositivo. Esto permite a un atacante extraer informaci\u00f3n, modificar y depurar el firmware del dispositivo. Todas las versiones conocidas se ven afectadas."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1191"
}
]
}
],
"references": [
{
"url": "https://r.sec-consult.com/wattsense",
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf"
},
{
"url": "https://support.wattsense.com/hc/en-150/articles/13366066529437-Release-Notes",
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf"
}
]
}