CVE Details for CVE: CVE-2016-5084
Summary
Johnson & Johnson Animas OneTouch Ping devices do not use encryption for certain data, which might allow remote attackers to obtain sensitive information by sniffing the network.
Timestamps
Last major update 24-12-2016 - 02:59
Published 05-10-2016 - 10:59
Last modified 24-12-2016 - 02:59
Vulnerable Configurations
  • cpe:2.3:o:animas:onetouch_ping_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:animas:onetouch_ping_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:animas:onetouch_ping:-:*:*:*:*:*:*:*
    cpe:2.3:h:animas:onetouch_ping:-:*:*:*:*:*:*:*
CAPEC
Click the CAPEC title to display a description
  • An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
CWE
CVSS
Base
5.0
Impact
2.9
Exploitability
10.0
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
CVSS3
Base
7.5
Impact
3.6
Exploitability
3.9
Access
Attack ComplexityAttack vectorPrivileges RequiredScopeUser Interaction
LOW NETWORK NONE UNCHANGED NONE
Impact
ConfidentialityIntegrityAvailability
HIGH NONE NONE