2024-12-08 03:06:42 +00:00

118 lines
4.3 KiB
JSON

{
"id": "CVE-2019-12820",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-07-19T18:15:11.807",
"lastModified": "2024-11-21T04:23:39.183",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in the app 2.0 of the Shenzhen Jisiwei i3 robot vacuum cleaner. Actions performed on the app such as changing a password, and personal information it communicates with the server, use unencrypted HTTP. As an example, while logging in through the app to a Jisiwei account, the login request is being sent in cleartext. The vulnerability exists in both the Android and iOS version of the app. An attacker could exploit this by using an MiTM attack on the local network to obtain someone's login credentials, which gives them full access to the robot vacuum cleaner."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en la aplicaci\u00f3n versi\u00f3n 2.0 del limpiador de vac\u00edo robot Jisiwei i3 de Shenzhen. Las acciones ejecutadas en la aplicaci\u00f3n, tales como cambiar una contrase\u00f1a e informaci\u00f3n personal que se comunica con el servidor, utilizan HTTP sin cifrar. Como ejemplo, al iniciar sesi\u00f3n por medio de la aplicaci\u00f3n en una cuenta de Jisiwei, la petici\u00f3n de inicio de sesi\u00f3n se env\u00eda en texto sin cifrar. La vulnerabilidad se presenta tanto en la versi\u00f3n de Android como en la de iOS de la aplicaci\u00f3n. Un atacante podr\u00eda explotar esto utilizando un ataque de tipo MiTM en la red local para obtener las credenciales de inicio de sesi\u00f3n de alguien, lo que les da acceso total al limpiador de vac\u00edo robot."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.2,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"baseScore": 4.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-319"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:jisiwei:i3_firmware:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "874CEFEB-F4EA-43EE-A4C1-16313539B876"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:jisiwei:i3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "50F2641E-12F5-4B2A-9C77-5797D7D1E79D"
}
]
}
]
}
],
"references": [
{
"url": "https://www.kth.se/polopoly_fs/1.914058.1561621210%21/Olsson_Larsson-Forsberg_vacuum.pdf",
"source": "cve@mitre.org"
},
{
"url": "https://www.kth.se/polopoly_fs/1.914058.1561621210%21/Olsson_Larsson-Forsberg_vacuum.pdf",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}