René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

124 lines
4.5 KiB
JSON

{
"id": "CVE-2017-17436",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-12-07T00:29:00.287",
"lastModified": "2017-12-22T15:59:37.883",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in the software on Vaultek Gun Safe VT20i products. There is no encryption of the session between the Android application and the safe. The website and marketing materials advertise that this communication channel is encrypted with \"Highest Level Bluetooth Encryption\" and \"Data transmissions are secure via AES256 bit encryption.\" These claims, however, are not true. Moreover, AES256 bit encryption is not supported in the Bluetooth Low Energy (BLE) standard, so it would have to be at the application level. This lack of encryption allows an individual to learn the passcode by eavesdropping on the communications between the application and the safe."
},
{
"lang": "es",
"value": "Se ha descubierto una vulnerabilidad en el software en productos Vaultek Gun Safe VT20i. No se cifra la sesi\u00f3n entre la aplicaci\u00f3n de Android y la caja fuerte. Los materiales de marketing as\u00ed como el sitio web anuncian que este canal est\u00e1 cifrado con \"un cifrado Bluetooth del m\u00e1s alto nivel\" y que \"las transmisiones de datos se realizan de forma segura mediante el cifrado de bits AES256\". Sin embargo, estas afirmaciones no son ciertas. Adem\u00e1s, los cifrados de bits AES256 no son compatibles con el est\u00e1ndar Bluetooth de baja energ\u00eda (Bluetooth LE), por lo que tendr\u00eda que serlo a nivel de aplicaci\u00f3n. Esta falta de cifrado permite que un usuario aprenda el c\u00f3digo de acceso espiando las comunicaciones entre la aplicaci\u00f3n y la caja fuerte."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "ADJACENT_NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3
},
"baseSeverity": "LOW",
"exploitabilityScore": 6.5,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-326"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:vaulteksafe:vt20i_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5EDBDB6F-0A1D-41A1-880F-5792AF4D192F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:vaulteksafe:vt20i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "86037AA2-62CF-41E7-815D-FDA28558F0E0"
}
]
}
]
}
],
"references": [
{
"url": "https://vaulteksafe.com/index.php/cve-2017-17435/",
"source": "cve@mitre.org",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.twosixlabs.com/bluesteal-popping-gatt-safes/",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}