Vulnerabilites related to binatoneglobal - mbp6855
var-202111-0509
Vulnerability from variot
An improper access control vulnerability was reported in some Motorola-branded Binatone Hubble Cameras which could allow an unauthenticated attacker on the same network as the device to access administrative pages that could result in information disclosure or device firmware update with verified firmware. plural Motorola-branded Binatone Hubble The camera has an unspecified vulnerability.Information may be obtained. Binatone Motorola-branded Camera is a Motorola-branded camera produced by Binatone authorized by Binatone
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-0509", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "cn28", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "cn75", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "mbp4855", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "cn50", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "mbp3667", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "connect view 65", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "focus 72r", "scope": "lt", "trust": 1.0, "vendor": "binatoneglobal", "version": "03.40.00" }, { "model": "halo\\+ camera", "scope": "lt", "trust": 1.0, "vendor": "binatoneglobal", "version": "03.50.14" }, { "model": "connect 20", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "lux 64", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "mbp3855", "scope": "lt", "trust": 1.0, "vendor": "binatoneglobal", "version": "03.40.00" }, { "model": "lux 65", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "comfort 85 connect", "scope": "lt", "trust": 1.0, "vendor": "binatoneglobal", "version": "03.40.02" }, { "model": "cn40", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "comfort 40", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "focus 68", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "comfort 50 connect", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "ease44", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "lux 85 connect", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "mbp669 connect", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "mbp6855", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "comfort 50 connect", "scope": null, "trust": 0.8, "vendor": "binatone global", "version": null }, { "model": "comfort 40", "scope": null, "trust": 0.8, "vendor": "binatone global", "version": null }, { "model": "cn28", "scope": null, "trust": 0.8, "vendor": "binatone global", "version": null }, { "model": "cn50", "scope": null, "trust": 0.8, "vendor": "binatone global", "version": null }, { "model": "mbp3855", "scope": null, "trust": 0.8, "vendor": "binatone global", "version": null }, { "model": "halo+ \u30ab\u30e1\u30e9", "scope": null, "trust": 0.8, "vendor": "binatone global", "version": null }, { "model": "mbp4855", "scope": null, "trust": 0.8, "vendor": "binatone global", "version": null }, { "model": "focus 72r", "scope": null, "trust": 0.8, "vendor": "binatone global", "version": null }, { "model": "comfort 85 connect", "scope": null, "trust": 0.8, "vendor": "binatone global", "version": null }, { "model": "focus 68", "scope": null, "trust": 0.8, "vendor": "binatone global", "version": null }, { "model": "motorola-branded camera", "scope": null, "trust": 0.6, "vendor": "binatone", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-77543" }, { "db": "JVNDB", "id": "JVNDB-2021-014945" }, { "db": "NVD", "id": "CVE-2021-3793" } ] }, "cve": "CVE-2021-3793", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-3793", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2022-77543", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "id": "CVE-2021-3793", "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "psirt@lenovo.com", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "id": "CVE-2021-3793", "impactScore": 2.5, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2021-3793", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-3793", "trust": 1.0, "value": "MEDIUM" }, { "author": "psirt@lenovo.com", "id": "CVE-2021-3793", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2021-3793", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2022-77543", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202111-1180", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-77543" }, { "db": "JVNDB", "id": "JVNDB-2021-014945" }, { "db": "CNNVD", "id": "CNNVD-202111-1180" }, { "db": "NVD", "id": "CVE-2021-3793" }, { "db": "NVD", "id": "CVE-2021-3793" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An improper access control vulnerability was reported in some Motorola-branded Binatone Hubble Cameras which could allow an unauthenticated attacker on the same network as the device to access administrative pages that could result in information disclosure or device firmware update with verified firmware. plural Motorola-branded Binatone Hubble The camera has an unspecified vulnerability.Information may be obtained. Binatone Motorola-branded Camera is a Motorola-branded camera produced by Binatone authorized by Binatone", "sources": [ { "db": "NVD", "id": "CVE-2021-3793" }, { "db": "JVNDB", "id": "JVNDB-2021-014945" }, { "db": "CNVD", "id": "CNVD-2022-77543" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-3793", "trust": 3.8 }, { "db": "JVNDB", "id": "JVNDB-2021-014945", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2022-77543", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202111-1180", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-77543" }, { "db": "JVNDB", "id": "JVNDB-2021-014945" }, { "db": "CNNVD", "id": "CNNVD-202111-1180" }, { "db": "NVD", "id": "CVE-2021-3793" } ] }, "id": "VAR-202111-0509", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-77543" } ], "trust": 1.6 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-77543" } ] }, "last_update_date": "2024-11-23T22:33:00.255000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Binatone\u00a0Motorola-branded\u00a0Camera\u00a0Vulnerabilities", "trust": 0.8, "url": "https://binatoneglobal.com/security-advisory/" }, { "title": "Patch for Binatone Motorola-branded Camera Access Control Error Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/360866" }, { "title": "Binatone Motorola-branded Camera Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=170337" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-77543" }, { "db": "JVNDB", "id": "JVNDB-2021-014945" }, { "db": "CNNVD", "id": "CNNVD-202111-1180" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "CWE-424", "trust": 1.0 }, { "problemtype": "others (CWE-Other) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014945" }, { "db": "NVD", "id": "CVE-2021-3793" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://binatoneglobal.com/security-advisory/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3793" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-77543" }, { "db": "JVNDB", "id": "JVNDB-2021-014945" }, { "db": "CNNVD", "id": "CNNVD-202111-1180" }, { "db": "NVD", "id": "CVE-2021-3793" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-77543" }, { "db": "JVNDB", "id": "JVNDB-2021-014945" }, { "db": "CNNVD", "id": "CNNVD-202111-1180" }, { "db": "NVD", "id": "CVE-2021-3793" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-16T00:00:00", "db": "CNVD", "id": "CNVD-2022-77543" }, { "date": "2022-11-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014945" }, { "date": "2021-11-12T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1180" }, { "date": "2021-11-12T22:15:08.473000", "db": "NVD", "id": "CVE-2021-3793" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-16T00:00:00", "db": "CNVD", "id": "CNVD-2022-77543" }, { "date": "2022-11-02T05:33:00", "db": "JVNDB", "id": "JVNDB-2021-014945" }, { "date": "2022-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1180" }, { "date": "2024-11-21T06:22:27", "db": "NVD", "id": "CVE-2021-3793" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1180" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Motorola-branded\u00a0Binatone\u00a0Hubble\u00a0 Vulnerability in camera", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014945" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1180" } ], "trust": 0.6 } }
var-202111-0512
Vulnerability from variot
A buffer overflow was reported in the local web server of some Motorola-branded Binatone Hubble Cameras that could allow an unauthenticated attacker on the same network to perform a denial-of-service attack against the device. plural Motorola-branded Binatone Hubble Cameras contain a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state. Binatone Motorola-branded Camera is a Motorola brand product camera authorized by Binatone Company
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-0512", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "cn28", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "cn75", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "mbp4855", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "cn50", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "mbp3667", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "connect view 65", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "focus 72r", "scope": "lt", "trust": 1.0, "vendor": "binatoneglobal", "version": "03.40.00" }, { "model": "halo\\+ camera", "scope": "lt", "trust": 1.0, "vendor": "binatoneglobal", "version": "03.50.14" }, { "model": "connect 20", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "lux 64", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "mbp3855", "scope": "lt", "trust": 1.0, "vendor": "binatoneglobal", "version": "03.40.00" }, { "model": "lux 65", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "comfort 85 connect", "scope": "lt", "trust": 1.0, "vendor": "binatoneglobal", "version": "03.40.02" }, { "model": "cn40", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "comfort 40", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "focus 68", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "comfort 50 connect", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "ease44", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "lux 85 connect", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "mbp669 connect", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "mbp6855", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "comfort 50 connect", "scope": null, "trust": 0.8, "vendor": "binatone global", "version": null }, { "model": "comfort 40", "scope": null, "trust": 0.8, "vendor": "binatone global", "version": null }, { "model": "cn28", "scope": null, "trust": 0.8, "vendor": "binatone global", "version": null }, { "model": "cn50", "scope": null, "trust": 0.8, "vendor": "binatone global", "version": null }, { "model": "mbp3855", "scope": null, "trust": 0.8, "vendor": "binatone global", "version": null }, { "model": "halo+ \u30ab\u30e1\u30e9", "scope": null, "trust": 0.8, "vendor": "binatone global", "version": null }, { "model": "mbp4855", "scope": null, "trust": 0.8, "vendor": "binatone global", "version": null }, { "model": "focus 72r", "scope": null, "trust": 0.8, "vendor": "binatone global", "version": null }, { "model": "comfort 85 connect", "scope": null, "trust": 0.8, "vendor": "binatone global", "version": null }, { "model": "focus 68", "scope": null, "trust": 0.8, "vendor": "binatone global", "version": null }, { "model": "motorola-branded camera", "scope": null, "trust": 0.6, "vendor": "binatone", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-77541" }, { "db": "JVNDB", "id": "JVNDB-2021-014942" }, { "db": "NVD", "id": "CVE-2021-3790" } ] }, "cve": "CVE-2021-3790", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 3.3, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "id": "CVE-2021-3790", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.8, "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 3.3, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "id": "CNVD-2022-77541", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.6, "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "id": "CVE-2021-3790", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 2.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "OTHER", "availabilityImpact": "High", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2021-014942", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-3790", "trust": 1.0, "value": "MEDIUM" }, { "author": "psirt@lenovo.com", "id": "CVE-2021-3790", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2021-3790", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2022-77541", "trust": 0.6, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-202111-1175", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-77541" }, { "db": "JVNDB", "id": "JVNDB-2021-014942" }, { "db": "CNNVD", "id": "CNNVD-202111-1175" }, { "db": "NVD", "id": "CVE-2021-3790" }, { "db": "NVD", "id": "CVE-2021-3790" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A buffer overflow was reported in the local web server of some Motorola-branded Binatone Hubble Cameras that could allow an unauthenticated attacker on the same network to perform a denial-of-service attack against the device. plural Motorola-branded Binatone Hubble Cameras contain a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state. Binatone Motorola-branded Camera is a Motorola brand product camera authorized by Binatone Company", "sources": [ { "db": "NVD", "id": "CVE-2021-3790" }, { "db": "JVNDB", "id": "JVNDB-2021-014942" }, { "db": "CNVD", "id": "CNVD-2022-77541" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-3790", "trust": 3.8 }, { "db": "JVNDB", "id": "JVNDB-2021-014942", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2022-77541", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202111-1175", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-77541" }, { "db": "JVNDB", "id": "JVNDB-2021-014942" }, { "db": "CNNVD", "id": "CNNVD-202111-1175" }, { "db": "NVD", "id": "CVE-2021-3790" } ] }, "id": "VAR-202111-0512", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-77541" } ], "trust": 1.6 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-77541" } ] }, "last_update_date": "2024-11-23T22:47:37.514000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Binatone\u00a0Motorola-branded\u00a0Camera\u00a0Vulnerabilities", "trust": 0.8, "url": "https://binatoneglobal.com/security-advisory/" }, { "title": "Patch for Binatone Motorola-branded Camera Buffer Overflow Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/360876" }, { "title": "Binatone Motorola-branded Camera Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=170333" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-77541" }, { "db": "JVNDB", "id": "JVNDB-2021-014942" }, { "db": "CNNVD", "id": "CNNVD-202111-1175" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-120", "trust": 1.0 }, { "problemtype": "CWE-121", "trust": 1.0 }, { "problemtype": "Classic buffer overflow (CWE-120) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014942" }, { "db": "NVD", "id": "CVE-2021-3790" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://binatoneglobal.com/security-advisory/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3790" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-77541" }, { "db": "JVNDB", "id": "JVNDB-2021-014942" }, { "db": "CNNVD", "id": "CNNVD-202111-1175" }, { "db": "NVD", "id": "CVE-2021-3790" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-77541" }, { "db": "JVNDB", "id": "JVNDB-2021-014942" }, { "db": "CNNVD", "id": "CNNVD-202111-1175" }, { "db": "NVD", "id": "CVE-2021-3790" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-16T00:00:00", "db": "CNVD", "id": "CNVD-2022-77541" }, { "date": "2022-11-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014942" }, { "date": "2021-11-12T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1175" }, { "date": "2021-11-12T22:15:08.317000", "db": "NVD", "id": "CVE-2021-3790" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-16T00:00:00", "db": "CNVD", "id": "CNVD-2022-77541" }, { "date": "2022-11-02T05:32:00", "db": "JVNDB", "id": "JVNDB-2021-014942" }, { "date": "2022-07-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1175" }, { "date": "2024-11-21T06:22:26.470000", "db": "NVD", "id": "CVE-2021-3790" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1175" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Motorola-branded\u00a0Binatone\u00a0Hubble\u00a0 Classic buffer overflow vulnerability in camera", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014942" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1175" } ], "trust": 0.6 } }
var-202111-0510
Vulnerability from variot
Some device communications in some Motorola-branded Binatone Hubble Cameras with backend Hubble services are not encrypted which could lead to the communication channel being accessible by an attacker. plural Motorola-branded Binatone Hubble Cameras contain a vulnerability related to sending sensitive information in plaintext.Information may be obtained. Binatone Motorola-branded Camera is a Motorola brand product camera authorized by Binatone Company
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-0510", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "cn28", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "cn75", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "mbp4855", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "cn50", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "mbp3667", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "connect view 65", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "focus 72r", "scope": "lt", "trust": 1.0, "vendor": "binatoneglobal", "version": "03.40.00" }, { "model": "halo\\+ camera", "scope": "lt", "trust": 1.0, "vendor": "binatoneglobal", "version": "03.50.14" }, { "model": "connect 20", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "lux 64", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "mbp3855", "scope": "lt", "trust": 1.0, "vendor": "binatoneglobal", "version": "03.40.00" }, { "model": "lux 65", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "comfort 85 connect", "scope": "lt", "trust": 1.0, "vendor": "binatoneglobal", "version": "03.40.02" }, { "model": "cn40", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "comfort 40", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "focus 68", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "comfort 50 connect", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "ease44", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "lux 85 connect", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "mbp669 connect", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "mbp6855", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "comfort 50 connect", "scope": null, "trust": 0.8, "vendor": "binatone global", "version": null }, { "model": "comfort 40", "scope": null, "trust": 0.8, "vendor": "binatone global", "version": null }, { "model": "cn28", "scope": null, "trust": 0.8, "vendor": "binatone global", "version": null }, { "model": "cn50", "scope": null, "trust": 0.8, "vendor": "binatone global", "version": null }, { "model": "mbp3855", "scope": null, "trust": 0.8, "vendor": "binatone global", "version": null }, { "model": "halo+ \u30ab\u30e1\u30e9", "scope": null, "trust": 0.8, "vendor": "binatone global", "version": null }, { "model": "mbp4855", "scope": null, "trust": 0.8, "vendor": "binatone global", "version": null }, { "model": "focus 72r", "scope": null, "trust": 0.8, "vendor": "binatone global", "version": null }, { "model": "comfort 85 connect", "scope": null, "trust": 0.8, "vendor": "binatone global", "version": null }, { "model": "focus 68", "scope": null, "trust": 0.8, "vendor": "binatone global", "version": null }, { "model": "motorola-branded camera", "scope": null, "trust": 0.6, "vendor": "binatone", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-77544" }, { "db": "JVNDB", "id": "JVNDB-2021-014944" }, { "db": "NVD", "id": "CVE-2021-3792" } ] }, "cve": "CVE-2021-3792", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-3792", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2022-77544", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "id": "CVE-2021-3792", "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 2.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "OTHER", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "JVNDB-2021-014944", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-3792", "trust": 1.0, "value": "MEDIUM" }, { "author": "psirt@lenovo.com", "id": "CVE-2021-3792", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2021-3792", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2022-77544", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202111-1178", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-77544" }, { "db": "JVNDB", "id": "JVNDB-2021-014944" }, { "db": "CNNVD", "id": "CNNVD-202111-1178" }, { "db": "NVD", "id": "CVE-2021-3792" }, { "db": "NVD", "id": "CVE-2021-3792" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Some device communications in some Motorola-branded Binatone Hubble Cameras with backend Hubble services are not encrypted which could lead to the communication channel being accessible by an attacker. plural Motorola-branded Binatone Hubble Cameras contain a vulnerability related to sending sensitive information in plaintext.Information may be obtained. Binatone Motorola-branded Camera is a Motorola brand product camera authorized by Binatone Company", "sources": [ { "db": "NVD", "id": "CVE-2021-3792" }, { "db": "JVNDB", "id": "JVNDB-2021-014944" }, { "db": "CNVD", "id": "CNVD-2022-77544" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-3792", "trust": 3.8 }, { "db": "JVNDB", "id": "JVNDB-2021-014944", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2022-77544", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202111-1178", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-77544" }, { "db": "JVNDB", "id": "JVNDB-2021-014944" }, { "db": "CNNVD", "id": "CNNVD-202111-1178" }, { "db": "NVD", "id": "CVE-2021-3792" } ] }, "id": "VAR-202111-0510", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-77544" } ], "trust": 1.6 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-77544" } ] }, "last_update_date": "2024-11-23T22:29:11.429000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Binatone\u00a0Motorola-branded\u00a0Camera\u00a0Vulnerabilities", "trust": 0.8, "url": "https://binatoneglobal.com/security-advisory/" }, { "title": "Patch for Binatone Motorola-branded Camera Has Unspecified Vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/360861" }, { "title": "Binatone Motorola-branded Camera Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=170335" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-77544" }, { "db": "JVNDB", "id": "JVNDB-2021-014944" }, { "db": "CNNVD", "id": "CNNVD-202111-1178" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-319", "trust": 1.0 }, { "problemtype": "Sending important information in clear text (CWE-319) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014944" }, { "db": "NVD", "id": "CVE-2021-3792" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://binatoneglobal.com/security-advisory/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3792" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-77544" }, { "db": "JVNDB", "id": "JVNDB-2021-014944" }, { "db": "CNNVD", "id": "CNNVD-202111-1178" }, { "db": "NVD", "id": "CVE-2021-3792" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-77544" }, { "db": "JVNDB", "id": "JVNDB-2021-014944" }, { "db": "CNNVD", "id": "CNNVD-202111-1178" }, { "db": "NVD", "id": "CVE-2021-3792" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-16T00:00:00", "db": "CNVD", "id": "CNVD-2022-77544" }, { "date": "2022-11-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014944" }, { "date": "2021-11-12T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1178" }, { "date": "2021-11-12T22:15:08.420000", "db": "NVD", "id": "CVE-2021-3792" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-16T00:00:00", "db": "CNVD", "id": "CNVD-2022-77544" }, { "date": "2022-11-02T05:32:00", "db": "JVNDB", "id": "JVNDB-2021-014944" }, { "date": "2022-07-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1178" }, { "date": "2024-11-21T06:22:26.823000", "db": "NVD", "id": "CVE-2021-3792" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1178" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Motorola-branded\u00a0Binatone\u00a0Hubble\u00a0 Vulnerability related to transmission of important information in plain text in camera", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014944" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1178" } ], "trust": 0.6 } }
var-202111-0514
Vulnerability from variot
An exposed debug interface was reported in some Motorola-branded Binatone Hubble Cameras that could allow an attacker with physical access unauthorized access to the device. plural Motorola-branded Binatone Hubble Cameras contain an authentication vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Binatone Motorola-branded Camera is a Motorola-branded product camera produced by Binatone authorized by Binatone
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-0514", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "cn28", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "cn75", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "mbp4855", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "cn50", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "mbp3667", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "connect view 65", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "focus 72r", "scope": "lt", "trust": 1.0, "vendor": "binatoneglobal", "version": "03.40.00" }, { "model": "halo\\+ camera", "scope": "lt", "trust": 1.0, "vendor": "binatoneglobal", "version": "03.50.14" }, { "model": "connect 20", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "lux 64", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "mbp3855", "scope": "lt", "trust": 1.0, "vendor": "binatoneglobal", "version": "03.40.00" }, { "model": "lux 65", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "comfort 85 connect", "scope": "lt", "trust": 1.0, "vendor": "binatoneglobal", "version": "03.40.02" }, { "model": "cn40", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "comfort 40", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "focus 68", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "comfort 50 connect", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "ease44", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "lux 85 connect", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "mbp669 connect", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "mbp6855", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "comfort 50 connect", "scope": null, "trust": 0.8, "vendor": "binatone global", "version": null }, { "model": "comfort 40", "scope": null, "trust": 0.8, "vendor": "binatone global", "version": null }, { "model": "cn28", "scope": null, "trust": 0.8, "vendor": "binatone global", "version": null }, { "model": "cn50", "scope": null, "trust": 0.8, "vendor": "binatone global", "version": null }, { "model": "mbp3855", "scope": null, "trust": 0.8, "vendor": "binatone global", "version": null }, { "model": "halo+ \u30ab\u30e1\u30e9", "scope": null, "trust": 0.8, "vendor": "binatone global", "version": null }, { "model": "mbp4855", "scope": null, "trust": 0.8, "vendor": "binatone global", "version": null }, { "model": "focus 72r", "scope": null, "trust": 0.8, "vendor": "binatone global", "version": null }, { "model": "comfort 85 connect", "scope": null, "trust": 0.8, "vendor": "binatone global", "version": null }, { "model": "focus 68", "scope": null, "trust": 0.8, "vendor": "binatone global", "version": null }, { "model": "motorola-branded camera", "scope": null, "trust": 0.6, "vendor": "binatone", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-77539" }, { "db": "JVNDB", "id": "JVNDB-2021-014940" }, { "db": "NVD", "id": "CVE-2021-3788" } ] }, "cve": "CVE-2021-3788", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2021-3788", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CNVD-2022-77539", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.9, "id": "CVE-2021-3788", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 2.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Physical", "author": "OTHER", "availabilityImpact": "High", "baseScore": 6.8, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2021-014940", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-3788", "trust": 1.0, "value": "MEDIUM" }, { "author": "psirt@lenovo.com", "id": "CVE-2021-3788", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2021-3788", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2022-77539", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202111-1173", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-77539" }, { "db": "JVNDB", "id": "JVNDB-2021-014940" }, { "db": "CNNVD", "id": "CNNVD-202111-1173" }, { "db": "NVD", "id": "CVE-2021-3788" }, { "db": "NVD", "id": "CVE-2021-3788" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An exposed debug interface was reported in some Motorola-branded Binatone Hubble Cameras that could allow an attacker with physical access unauthorized access to the device. plural Motorola-branded Binatone Hubble Cameras contain an authentication vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Binatone Motorola-branded Camera is a Motorola-branded product camera produced by Binatone authorized by Binatone", "sources": [ { "db": "NVD", "id": "CVE-2021-3788" }, { "db": "JVNDB", "id": "JVNDB-2021-014940" }, { "db": "CNVD", "id": "CNVD-2022-77539" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-3788", "trust": 3.8 }, { "db": "JVNDB", "id": "JVNDB-2021-014940", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2022-77539", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202111-1173", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-77539" }, { "db": "JVNDB", "id": "JVNDB-2021-014940" }, { "db": "CNNVD", "id": "CNNVD-202111-1173" }, { "db": "NVD", "id": "CVE-2021-3788" } ] }, "id": "VAR-202111-0514", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-77539" } ], "trust": 1.6 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-77539" } ] }, "last_update_date": "2024-11-23T23:07:35.303000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Binatone\u00a0Motorola-branded\u00a0Camera\u00a0Vulnerabilities", "trust": 0.8, "url": "https://binatoneglobal.com/security-advisory/" }, { "title": "Patch for Binatone Motorola-branded Camera Authorization Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/360886" }, { "title": "Binatone Motorola-branded Camera Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=169732" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-77539" }, { "db": "JVNDB", "id": "JVNDB-2021-014940" }, { "db": "CNNVD", "id": "CNNVD-202111-1173" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.0 }, { "problemtype": "CWE-1299", "trust": 1.0 }, { "problemtype": "Inappropriate authentication (CWE-287) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014940" }, { "db": "NVD", "id": "CVE-2021-3788" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://binatoneglobal.com/security-advisory/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3788" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-77539" }, { "db": "JVNDB", "id": "JVNDB-2021-014940" }, { "db": "CNNVD", "id": "CNNVD-202111-1173" }, { "db": "NVD", "id": "CVE-2021-3788" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-77539" }, { "db": "JVNDB", "id": "JVNDB-2021-014940" }, { "db": "CNNVD", "id": "CNNVD-202111-1173" }, { "db": "NVD", "id": "CVE-2021-3788" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-16T00:00:00", "db": "CNVD", "id": "CNVD-2022-77539" }, { "date": "2022-11-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014940" }, { "date": "2021-11-12T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1173" }, { "date": "2021-11-12T22:15:08.213000", "db": "NVD", "id": "CVE-2021-3788" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-16T00:00:00", "db": "CNVD", "id": "CNVD-2022-77539" }, { "date": "2022-11-02T05:32:00", "db": "JVNDB", "id": "JVNDB-2021-014940" }, { "date": "2022-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1173" }, { "date": "2024-11-21T06:22:26.123000", "db": "NVD", "id": "CVE-2021-3788" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Motorola-branded\u00a0Binatone\u00a0Hubble\u00a0 Camera Authentication Vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014940" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1173" } ], "trust": 0.6 } }
var-202111-0513
Vulnerability from variot
An information disclosure vulnerability was reported in some Motorola-branded Binatone Hubble Cameras that could allow an attacker with physical access to obtain the encryption key used to decrypt firmware update packages. plural Motorola-branded Binatone Hubble The camera has a cryptographic strength vulnerability.Information may be obtained. Binatone Motorola-branded Camera is a Motorola brand product camera produced by Binatone authorized by Binatone
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-0513", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "cn28", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "cn75", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "mbp4855", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "cn50", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "mbp3667", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "connect view 65", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "focus 72r", "scope": "lt", "trust": 1.0, "vendor": "binatoneglobal", "version": "03.40.00" }, { "model": "halo\\+ camera", "scope": "lt", "trust": 1.0, "vendor": "binatoneglobal", "version": "03.50.14" }, { "model": "connect 20", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "lux 64", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "mbp3855", "scope": "lt", "trust": 1.0, "vendor": "binatoneglobal", "version": "03.40.00" }, { "model": "lux 65", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "comfort 85 connect", "scope": "lt", "trust": 1.0, "vendor": "binatoneglobal", "version": "03.40.02" }, { "model": "cn40", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "comfort 40", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "focus 68", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "comfort 50 connect", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "ease44", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "lux 85 connect", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "mbp669 connect", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "mbp6855", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "comfort 50 connect", "scope": null, "trust": 0.8, "vendor": "binatone global", "version": null }, { "model": "comfort 40", "scope": null, "trust": 0.8, "vendor": "binatone global", "version": null }, { "model": "cn28", "scope": null, "trust": 0.8, "vendor": "binatone global", "version": null }, { "model": "cn50", "scope": null, "trust": 0.8, "vendor": "binatone global", "version": null }, { "model": "mbp3855", "scope": null, "trust": 0.8, "vendor": "binatone global", "version": null }, { "model": "halo+ \u30ab\u30e1\u30e9", "scope": null, "trust": 0.8, "vendor": "binatone global", "version": null }, { "model": "mbp4855", "scope": null, "trust": 0.8, "vendor": "binatone global", "version": null }, { "model": "focus 72r", "scope": null, "trust": 0.8, "vendor": "binatone global", "version": null }, { "model": "comfort 85 connect", "scope": null, "trust": 0.8, "vendor": "binatone global", "version": null }, { "model": "focus 68", "scope": null, "trust": 0.8, "vendor": "binatone global", "version": null }, { "model": "motorola-branded camera", "scope": null, "trust": 0.6, "vendor": "binatone", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-77540" }, { "db": "JVNDB", "id": "JVNDB-2021-014941" }, { "db": "NVD", "id": "CVE-2021-3789" } ] }, "cve": "CVE-2021-3789", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2021-3789", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.8, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CNVD-2022-77540", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.9, "id": "CVE-2021-3789", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "HIGH", "attackVector": "PHYSICAL", "author": "psirt@lenovo.com", "availabilityImpact": "NONE", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.5, "id": "CVE-2021-3789", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Physical", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.6, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-3789", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-3789", "trust": 1.0, "value": "MEDIUM" }, { "author": "psirt@lenovo.com", "id": "CVE-2021-3789", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2021-3789", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2022-77540", "trust": 0.6, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-202111-1174", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-77540" }, { "db": "JVNDB", "id": "JVNDB-2021-014941" }, { "db": "CNNVD", "id": "CNNVD-202111-1174" }, { "db": "NVD", "id": "CVE-2021-3789" }, { "db": "NVD", "id": "CVE-2021-3789" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An information disclosure vulnerability was reported in some Motorola-branded Binatone Hubble Cameras that could allow an attacker with physical access to obtain the encryption key used to decrypt firmware update packages. plural Motorola-branded Binatone Hubble The camera has a cryptographic strength vulnerability.Information may be obtained. Binatone Motorola-branded Camera is a Motorola brand product camera produced by Binatone authorized by Binatone", "sources": [ { "db": "NVD", "id": "CVE-2021-3789" }, { "db": "JVNDB", "id": "JVNDB-2021-014941" }, { "db": "CNVD", "id": "CNVD-2022-77540" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-3789", "trust": 3.8 }, { "db": "JVNDB", "id": "JVNDB-2021-014941", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2022-77540", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202111-1174", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-77540" }, { "db": "JVNDB", "id": "JVNDB-2021-014941" }, { "db": "CNNVD", "id": "CNNVD-202111-1174" }, { "db": "NVD", "id": "CVE-2021-3789" } ] }, "id": "VAR-202111-0513", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-77540" } ], "trust": 1.6 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-77540" } ] }, "last_update_date": "2024-11-23T22:44:08.602000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Binatone\u00a0Motorola-branded\u00a0Camera\u00a0Vulnerabilities", "trust": 0.8, "url": "https://binatoneglobal.com/security-advisory/" }, { "title": "Patch for Binatone Motorola-branded Camera Information Disclosure Vulnerability (CNVD-2022-77540)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/360881" }, { "title": "Binatone Motorola-branded Camera Fixes for encryption problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=170332" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-77540" }, { "db": "JVNDB", "id": "JVNDB-2021-014941" }, { "db": "CNNVD", "id": "CNNVD-202111-1174" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-326", "trust": 1.0 }, { "problemtype": "CWE-522", "trust": 1.0 }, { "problemtype": "Inappropriate cryptographic strength (CWE-326) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014941" }, { "db": "NVD", "id": "CVE-2021-3789" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://binatoneglobal.com/security-advisory/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3789" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-77540" }, { "db": "JVNDB", "id": "JVNDB-2021-014941" }, { "db": "CNNVD", "id": "CNNVD-202111-1174" }, { "db": "NVD", "id": "CVE-2021-3789" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-77540" }, { "db": "JVNDB", "id": "JVNDB-2021-014941" }, { "db": "CNNVD", "id": "CNNVD-202111-1174" }, { "db": "NVD", "id": "CVE-2021-3789" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-16T00:00:00", "db": "CNVD", "id": "CNVD-2022-77540" }, { "date": "2022-11-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014941" }, { "date": "2021-11-12T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1174" }, { "date": "2021-11-12T22:15:08.267000", "db": "NVD", "id": "CVE-2021-3789" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-16T00:00:00", "db": "CNVD", "id": "CNVD-2022-77540" }, { "date": "2022-11-02T05:32:00", "db": "JVNDB", "id": "JVNDB-2021-014941" }, { "date": "2022-07-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1174" }, { "date": "2024-11-21T06:22:26.297000", "db": "NVD", "id": "CVE-2021-3789" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Motorola-branded\u00a0Binatone\u00a0Hubble\u00a0 Vulnerability related to encryption strength in cameras", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014941" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "encryption problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1174" } ], "trust": 0.6 } }
var-202111-0511
Vulnerability from variot
An information disclosure vulnerability was reported in some Motorola-branded Binatone Hubble Cameras that could allow an unauthenticated attacker on the same subnet to download an encrypted log file containing sensitive information such as WiFi SSID and password. Binatone Motorola-branded Camera is a Motorola brand product camera authorized by Binatone Company
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-0511", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "cn28", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "cn75", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "mbp4855", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "cn50", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "mbp3667", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "connect view 65", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "focus 72r", "scope": "lt", "trust": 1.0, "vendor": "binatoneglobal", "version": "03.40.00" }, { "model": "halo\\+ camera", "scope": "lt", "trust": 1.0, "vendor": "binatoneglobal", "version": "03.50.14" }, { "model": "connect 20", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "lux 64", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "mbp3855", "scope": "lt", "trust": 1.0, "vendor": "binatoneglobal", "version": "03.40.00" }, { "model": "lux 65", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "comfort 85 connect", "scope": "lt", "trust": 1.0, "vendor": "binatoneglobal", "version": "03.40.02" }, { "model": "cn40", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "comfort 40", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "focus 68", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "comfort 50 connect", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "ease44", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "lux 85 connect", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "mbp669 connect", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "mbp6855", "scope": "eq", "trust": 1.0, "vendor": "binatoneglobal", "version": null }, { "model": "comfort 50 connect", "scope": null, "trust": 0.8, "vendor": "binatone global", "version": null }, { "model": "comfort 40", "scope": null, "trust": 0.8, "vendor": "binatone global", "version": null }, { "model": "cn28", "scope": null, "trust": 0.8, "vendor": "binatone global", "version": null }, { "model": "cn50", "scope": null, "trust": 0.8, "vendor": "binatone global", "version": null }, { "model": "mbp3855", "scope": null, "trust": 0.8, "vendor": "binatone global", "version": null }, { "model": "halo+ \u30ab\u30e1\u30e9", "scope": null, "trust": 0.8, "vendor": "binatone global", "version": null }, { "model": "mbp4855", "scope": null, "trust": 0.8, "vendor": "binatone global", "version": null }, { "model": "focus 72r", "scope": null, "trust": 0.8, "vendor": "binatone global", "version": null }, { "model": "comfort 85 connect", "scope": null, "trust": 0.8, "vendor": "binatone global", "version": null }, { "model": "focus 68", "scope": null, "trust": 0.8, "vendor": "binatone global", "version": null }, { "model": "motorola-branded camera", "scope": null, "trust": 0.6, "vendor": "binatone", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-77542" }, { "db": "JVNDB", "id": "JVNDB-2021-014943" }, { "db": "NVD", "id": "CVE-2021-3791" } ] }, "cve": "CVE-2021-3791", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.5, "id": "CVE-2021-3791", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.8, "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.5, "id": "CNVD-2022-77542", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.6, "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2021-3791", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 2.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "OTHER", "availabilityImpact": "None", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2021-014943", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-3791", "trust": 1.0, "value": "MEDIUM" }, { "author": "psirt@lenovo.com", "id": "CVE-2021-3791", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2021-3791", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2022-77542", "trust": 0.6, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-202111-1177", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-77542" }, { "db": "JVNDB", "id": "JVNDB-2021-014943" }, { "db": "CNNVD", "id": "CNNVD-202111-1177" }, { "db": "NVD", "id": "CVE-2021-3791" }, { "db": "NVD", "id": "CVE-2021-3791" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An information disclosure vulnerability was reported in some Motorola-branded Binatone Hubble Cameras that could allow an unauthenticated attacker on the same subnet to download an encrypted log file containing sensitive information such as WiFi SSID and password. Binatone Motorola-branded Camera is a Motorola brand product camera authorized by Binatone Company", "sources": [ { "db": "NVD", "id": "CVE-2021-3791" }, { "db": "JVNDB", "id": "JVNDB-2021-014943" }, { "db": "CNVD", "id": "CNVD-2022-77542" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-3791", "trust": 3.8 }, { "db": "JVNDB", "id": "JVNDB-2021-014943", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2022-77542", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202111-1177", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-77542" }, { "db": "JVNDB", "id": "JVNDB-2021-014943" }, { "db": "CNNVD", "id": "CNNVD-202111-1177" }, { "db": "NVD", "id": "CVE-2021-3791" } ] }, "id": "VAR-202111-0511", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-77542" } ], "trust": 1.6 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-77542" } ] }, "last_update_date": "2024-11-23T21:58:39.059000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Binatone\u00a0Motorola-branded\u00a0Camera\u00a0Vulnerabilities", "trust": 0.8, "url": "https://binatoneglobal.com/security-advisory/" }, { "title": "Patch for Binatone Motorola-branded Camera Information Disclosure Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/360871" }, { "title": "Binatone Motorola-branded Camera Repair measures for log information disclosure vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=170334" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-77542" }, { "db": "JVNDB", "id": "JVNDB-2021-014943" }, { "db": "CNNVD", "id": "CNNVD-202111-1177" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-532", "trust": 1.0 }, { "problemtype": "Information leakage from log files (CWE-532) [ others ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014943" }, { "db": "NVD", "id": "CVE-2021-3791" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://binatoneglobal.com/security-advisory/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3791" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-77542" }, { "db": "JVNDB", "id": "JVNDB-2021-014943" }, { "db": "CNNVD", "id": "CNNVD-202111-1177" }, { "db": "NVD", "id": "CVE-2021-3791" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-77542" }, { "db": "JVNDB", "id": "JVNDB-2021-014943" }, { "db": "CNNVD", "id": "CNNVD-202111-1177" }, { "db": "NVD", "id": "CVE-2021-3791" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-16T00:00:00", "db": "CNVD", "id": "CNVD-2022-77542" }, { "date": "2022-11-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014943" }, { "date": "2021-11-12T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1177" }, { "date": "2021-11-12T22:15:08.367000", "db": "NVD", "id": "CVE-2021-3791" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-16T00:00:00", "db": "CNVD", "id": "CNVD-2022-77542" }, { "date": "2022-11-02T05:32:00", "db": "JVNDB", "id": "JVNDB-2021-014943" }, { "date": "2022-07-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1177" }, { "date": "2024-11-21T06:22:26.647000", "db": "NVD", "id": "CVE-2021-3791" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1177" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Motorola-branded\u00a0Binatone\u00a0Hubble\u00a0 Vulnerability related to information leakage from log files in cameras", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014943" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "log information leak", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1177" } ], "trust": 0.6 } }
Vulnerability from fkie_nvd
6.5 (Medium) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
▼ | URL | Tags | |
---|---|---|---|
psirt@lenovo.com | https://binatoneglobal.com/security-advisory/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://binatoneglobal.com/security-advisory/ | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:halo\\+_camera_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF4488A5-47D6-41ED-9197-0544B095091A", "versionEndExcluding": "03.50.14", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:halo\\+_camera:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF35A97E-FD84-471F-BAD5-4E7D1573F89E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:comfort_85_connect_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DAB7C8AB-A62A-4585-B6DA-868AB082542E", "versionEndExcluding": "03.40.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:comfort_85_connect:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A24AA60-4C10-4D6B-A5A0-2F26C72844E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:mbp3855_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BCE58D96-4FEC-4214-A164-E5BA7F5B2C29", "versionEndExcluding": "03.40.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:mbp3855:-:*:*:*:*:*:*:*", "matchCriteriaId": "48B956E5-73D0-4286-95B0-BBCFD30E2F4A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:focus_68_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0F3F208-93A5-4CFE-9F7B-E768F039C597", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:focus_68:v100:*:*:*:*:*:*:*", "matchCriteriaId": "2BB7A9FD-152B-4E09-826C-45AF1CAFE105", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:focus_68_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0F3F208-93A5-4CFE-9F7B-E768F039C597", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:focus_68:v200:*:*:*:*:*:*:*", "matchCriteriaId": "80860B5A-DA27-47AD-83CC-4D8ECE938F05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:focus_72r_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "67C7BE1C-0F3F-4559-9100-94B2213DD516", "versionEndExcluding": "03.40.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:focus_72r:v100:*:*:*:*:*:*:*", "matchCriteriaId": "19A8CE00-888A-4A11-BFE2-0A43FFAD7E82", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:focus_72r_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "67C7BE1C-0F3F-4559-9100-94B2213DD516", "versionEndExcluding": "03.40.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:focus_72r:v200:*:*:*:*:*:*:*", "matchCriteriaId": "09EF4092-FBBF-4CC1-9DE6-4E7914BB7D9F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:cn28_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE722C2E-B7D0-44DA-A494-030B6A8CE465", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:cn28:-:*:*:*:*:*:*:*", "matchCriteriaId": "BEFB40A7-64F5-4057-A1C7-483D809F4DC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:cn50_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "39A98169-B314-4C02-B936-ECCC6A224CE1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:cn50:-:*:*:*:*:*:*:*", "matchCriteriaId": "35A2752F-B339-4B61-874E-FDB063EE7468", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:comfort_40_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "34F7D5B9-C1A9-484E-8339-AA2199FD2097", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:comfort_40:-:*:*:*:*:*:*:*", "matchCriteriaId": "86D5680E-9746-405F-B257-6BE5F9457250", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:comfort_50_connect_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5136037-CAE0-4C43-92B6-ED95D9D88EF3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:comfort_50_connect:-:*:*:*:*:*:*:*", "matchCriteriaId": "711AD353-9CC1-40F5-A4BB-6ED9C0EB4436", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:mbp4855_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E41C52F-8993-42EC-A7E7-21830663496B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:mbp4855:-:*:*:*:*:*:*:*", "matchCriteriaId": "62B80F89-A9CA-4CEA-8091-593FE73CA1DA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:mbp3667_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "88CFF394-3622-4E86-BC47-D1050456FB66", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:mbp3667:-:*:*:*:*:*:*:*", "matchCriteriaId": "96B06D2A-47A5-421F-980F-3E31AF89C4AA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:mbp669_connect_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F6BDA58-E9FD-4A4D-AC45-8E62C778247B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:mbp669_connect:-:*:*:*:*:*:*:*", "matchCriteriaId": "C01867E5-A3D4-486B-A49B-1A34E5AB61A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:lux_64_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "13AC5EE6-C75D-46A5-A235-F653E7ABB6E0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:lux_64:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AE5C627-EDAB-4407-90C9-299C2E11969B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:lux_65_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "00E8AB8F-165B-4810-B52B-19B9B1BAD286", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:lux_65:-:*:*:*:*:*:*:*", "matchCriteriaId": "D58F7A0E-6009-4D51-96B3-21774E94A4B5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:connect_view_65_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "019A6C5F-61C5-48F6-B036-372347CB3EFA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:connect_view_65:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CED7B6B-A318-4956-8E9E-7E9F333F6849", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:lux_85_connect_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "99E734BF-B4FB-46D4-B7D1-D1FBC4D8F59C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:lux_85_connect:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBB23100-4786-4343-97A6-BEE11176B730", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:ease44_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB6A5A5B-2E32-41D4-8077-0146ED2D5015", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:ease44:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D8383CE-EFC9-48DF-98B5-25B37630EBB8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:connect_20_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A367895E-0D4A-4634-97C1-AEEB4266D3D9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:connect_20:-:*:*:*:*:*:*:*", "matchCriteriaId": "496B82F4-9CBB-4F9D-9DFD-DFC1B21D3A7E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:mbp6855_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DEB4430-4E36-4D7E-800E-FFC81CA805FC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:mbp6855:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DAAE13D-6EB2-4029-BC47-2E5D1F490FF2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:cn40_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC267B84-161F-4EE2-8E72-4820F7175B96", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:cn40:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9316C7C-2041-4A1B-A296-4C06DB5E9F89", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:cn75_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7D7AA6CF-7FEE-4ACE-9BD8-383BA30CCB3A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:cn75:-:*:*:*:*:*:*:*", "matchCriteriaId": "00550EB3-E556-48AE-95FA-84F8B0E177C6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An information disclosure vulnerability was reported in some Motorola-branded Binatone Hubble Cameras that could allow an unauthenticated attacker on the same subnet to download an encrypted log file containing sensitive information such as WiFi SSID and password." }, { "lang": "es", "value": "Se ha notificado una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en algunas c\u00e1maras Binatone Hubble de la marca Motorola que podr\u00eda permitir a un atacante no autenticado en la misma subred descargar un archivo de registro cifrado que contenga informaci\u00f3n confidencial como el SSID y la contrase\u00f1a del WiFi" } ], "id": "CVE-2021-3791", "lastModified": "2024-11-21T06:22:26.647", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "psirt@lenovo.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-12T22:15:08.367", "references": [ { "source": "psirt@lenovo.com", "tags": [ "Vendor Advisory" ], "url": "https://binatoneglobal.com/security-advisory/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://binatoneglobal.com/security-advisory/" } ], "sourceIdentifier": "psirt@lenovo.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-532" } ], "source": "psirt@lenovo.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-532" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
4.6 (Medium) - CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
▼ | URL | Tags | |
---|---|---|---|
psirt@lenovo.com | https://binatoneglobal.com/security-advisory/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://binatoneglobal.com/security-advisory/ | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:halo\\+_camera_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF4488A5-47D6-41ED-9197-0544B095091A", "versionEndExcluding": "03.50.14", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:halo\\+_camera:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF35A97E-FD84-471F-BAD5-4E7D1573F89E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:comfort_85_connect_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DAB7C8AB-A62A-4585-B6DA-868AB082542E", "versionEndExcluding": "03.40.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:comfort_85_connect:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A24AA60-4C10-4D6B-A5A0-2F26C72844E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:mbp3855_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BCE58D96-4FEC-4214-A164-E5BA7F5B2C29", "versionEndExcluding": "03.40.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:mbp3855:-:*:*:*:*:*:*:*", "matchCriteriaId": "48B956E5-73D0-4286-95B0-BBCFD30E2F4A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:focus_68_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0F3F208-93A5-4CFE-9F7B-E768F039C597", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:focus_68:v100:*:*:*:*:*:*:*", "matchCriteriaId": "2BB7A9FD-152B-4E09-826C-45AF1CAFE105", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:focus_68_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0F3F208-93A5-4CFE-9F7B-E768F039C597", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:focus_68:v200:*:*:*:*:*:*:*", "matchCriteriaId": "80860B5A-DA27-47AD-83CC-4D8ECE938F05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:focus_72r_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "67C7BE1C-0F3F-4559-9100-94B2213DD516", "versionEndExcluding": "03.40.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:focus_72r:v100:*:*:*:*:*:*:*", "matchCriteriaId": "19A8CE00-888A-4A11-BFE2-0A43FFAD7E82", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:focus_72r_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "67C7BE1C-0F3F-4559-9100-94B2213DD516", "versionEndExcluding": "03.40.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:focus_72r:v200:*:*:*:*:*:*:*", "matchCriteriaId": "09EF4092-FBBF-4CC1-9DE6-4E7914BB7D9F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:cn28_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE722C2E-B7D0-44DA-A494-030B6A8CE465", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:cn28:-:*:*:*:*:*:*:*", "matchCriteriaId": "BEFB40A7-64F5-4057-A1C7-483D809F4DC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:cn50_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "39A98169-B314-4C02-B936-ECCC6A224CE1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:cn50:-:*:*:*:*:*:*:*", "matchCriteriaId": "35A2752F-B339-4B61-874E-FDB063EE7468", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:comfort_40_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "34F7D5B9-C1A9-484E-8339-AA2199FD2097", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:comfort_40:-:*:*:*:*:*:*:*", "matchCriteriaId": "86D5680E-9746-405F-B257-6BE5F9457250", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:comfort_50_connect_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5136037-CAE0-4C43-92B6-ED95D9D88EF3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:comfort_50_connect:-:*:*:*:*:*:*:*", "matchCriteriaId": "711AD353-9CC1-40F5-A4BB-6ED9C0EB4436", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:mbp4855_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E41C52F-8993-42EC-A7E7-21830663496B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:mbp4855:-:*:*:*:*:*:*:*", "matchCriteriaId": "62B80F89-A9CA-4CEA-8091-593FE73CA1DA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:mbp3667_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "88CFF394-3622-4E86-BC47-D1050456FB66", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:mbp3667:-:*:*:*:*:*:*:*", "matchCriteriaId": "96B06D2A-47A5-421F-980F-3E31AF89C4AA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:mbp669_connect_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F6BDA58-E9FD-4A4D-AC45-8E62C778247B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:mbp669_connect:-:*:*:*:*:*:*:*", "matchCriteriaId": "C01867E5-A3D4-486B-A49B-1A34E5AB61A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:lux_64_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "13AC5EE6-C75D-46A5-A235-F653E7ABB6E0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:lux_64:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AE5C627-EDAB-4407-90C9-299C2E11969B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:lux_65_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "00E8AB8F-165B-4810-B52B-19B9B1BAD286", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:lux_65:-:*:*:*:*:*:*:*", "matchCriteriaId": "D58F7A0E-6009-4D51-96B3-21774E94A4B5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:connect_view_65_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "019A6C5F-61C5-48F6-B036-372347CB3EFA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:connect_view_65:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CED7B6B-A318-4956-8E9E-7E9F333F6849", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:lux_85_connect_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "99E734BF-B4FB-46D4-B7D1-D1FBC4D8F59C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:lux_85_connect:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBB23100-4786-4343-97A6-BEE11176B730", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:ease44_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB6A5A5B-2E32-41D4-8077-0146ED2D5015", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:ease44:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D8383CE-EFC9-48DF-98B5-25B37630EBB8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:connect_20_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A367895E-0D4A-4634-97C1-AEEB4266D3D9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:connect_20:-:*:*:*:*:*:*:*", "matchCriteriaId": "496B82F4-9CBB-4F9D-9DFD-DFC1B21D3A7E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:mbp6855_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DEB4430-4E36-4D7E-800E-FFC81CA805FC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:mbp6855:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DAAE13D-6EB2-4029-BC47-2E5D1F490FF2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:cn40_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC267B84-161F-4EE2-8E72-4820F7175B96", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:cn40:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9316C7C-2041-4A1B-A296-4C06DB5E9F89", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:cn75_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7D7AA6CF-7FEE-4ACE-9BD8-383BA30CCB3A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:cn75:-:*:*:*:*:*:*:*", "matchCriteriaId": "00550EB3-E556-48AE-95FA-84F8B0E177C6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An information disclosure vulnerability was reported in some Motorola-branded Binatone Hubble Cameras that could allow an attacker with physical access to obtain the encryption key used to decrypt firmware update packages." }, { "lang": "es", "value": "Se notific\u00f3 una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en algunas c\u00e1maras Binatone Hubble de la marca Motorola que podr\u00eda permitir a un atacante con acceso f\u00edsico obtener la clave de cifrado usada para descifrar los paquetes de actualizaci\u00f3n del firmware" } ], "id": "CVE-2021-3789", "lastModified": "2024-11-21T06:22:26.297", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 0.5, "impactScore": 3.6, "source": "psirt@lenovo.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-12T22:15:08.267", "references": [ { "source": "psirt@lenovo.com", "tags": [ "Vendor Advisory" ], "url": "https://binatoneglobal.com/security-advisory/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://binatoneglobal.com/security-advisory/" } ], "sourceIdentifier": "psirt@lenovo.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-522" } ], "source": "psirt@lenovo.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-326" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
8.8 (High) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
▼ | URL | Tags | |
---|---|---|---|
psirt@lenovo.com | https://binatoneglobal.com/security-advisory/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://binatoneglobal.com/security-advisory/ | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:halo\\+_camera_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF4488A5-47D6-41ED-9197-0544B095091A", "versionEndExcluding": "03.50.14", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:halo\\+_camera:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF35A97E-FD84-471F-BAD5-4E7D1573F89E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:comfort_85_connect_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DAB7C8AB-A62A-4585-B6DA-868AB082542E", "versionEndExcluding": "03.40.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:comfort_85_connect:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A24AA60-4C10-4D6B-A5A0-2F26C72844E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:mbp3855_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BCE58D96-4FEC-4214-A164-E5BA7F5B2C29", "versionEndExcluding": "03.40.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:mbp3855:-:*:*:*:*:*:*:*", "matchCriteriaId": "48B956E5-73D0-4286-95B0-BBCFD30E2F4A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:focus_68_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0F3F208-93A5-4CFE-9F7B-E768F039C597", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:focus_68:v100:*:*:*:*:*:*:*", "matchCriteriaId": "2BB7A9FD-152B-4E09-826C-45AF1CAFE105", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:focus_68_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0F3F208-93A5-4CFE-9F7B-E768F039C597", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:focus_68:v200:*:*:*:*:*:*:*", "matchCriteriaId": "80860B5A-DA27-47AD-83CC-4D8ECE938F05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:focus_72r_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "67C7BE1C-0F3F-4559-9100-94B2213DD516", "versionEndExcluding": "03.40.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:focus_72r:v100:*:*:*:*:*:*:*", "matchCriteriaId": "19A8CE00-888A-4A11-BFE2-0A43FFAD7E82", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:focus_72r_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "67C7BE1C-0F3F-4559-9100-94B2213DD516", "versionEndExcluding": "03.40.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:focus_72r:v200:*:*:*:*:*:*:*", "matchCriteriaId": "09EF4092-FBBF-4CC1-9DE6-4E7914BB7D9F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:cn28_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE722C2E-B7D0-44DA-A494-030B6A8CE465", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:cn28:-:*:*:*:*:*:*:*", "matchCriteriaId": "BEFB40A7-64F5-4057-A1C7-483D809F4DC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:cn50_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "39A98169-B314-4C02-B936-ECCC6A224CE1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:cn50:-:*:*:*:*:*:*:*", "matchCriteriaId": "35A2752F-B339-4B61-874E-FDB063EE7468", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:comfort_40_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "34F7D5B9-C1A9-484E-8339-AA2199FD2097", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:comfort_40:-:*:*:*:*:*:*:*", "matchCriteriaId": "86D5680E-9746-405F-B257-6BE5F9457250", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:comfort_50_connect_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5136037-CAE0-4C43-92B6-ED95D9D88EF3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:comfort_50_connect:-:*:*:*:*:*:*:*", "matchCriteriaId": "711AD353-9CC1-40F5-A4BB-6ED9C0EB4436", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:mbp4855_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E41C52F-8993-42EC-A7E7-21830663496B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:mbp4855:-:*:*:*:*:*:*:*", "matchCriteriaId": "62B80F89-A9CA-4CEA-8091-593FE73CA1DA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:mbp3667_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "88CFF394-3622-4E86-BC47-D1050456FB66", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:mbp3667:-:*:*:*:*:*:*:*", "matchCriteriaId": "96B06D2A-47A5-421F-980F-3E31AF89C4AA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:mbp669_connect_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F6BDA58-E9FD-4A4D-AC45-8E62C778247B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:mbp669_connect:-:*:*:*:*:*:*:*", "matchCriteriaId": "C01867E5-A3D4-486B-A49B-1A34E5AB61A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:lux_64_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "13AC5EE6-C75D-46A5-A235-F653E7ABB6E0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:lux_64:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AE5C627-EDAB-4407-90C9-299C2E11969B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:lux_65_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "00E8AB8F-165B-4810-B52B-19B9B1BAD286", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:lux_65:-:*:*:*:*:*:*:*", "matchCriteriaId": "D58F7A0E-6009-4D51-96B3-21774E94A4B5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:connect_view_65_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "019A6C5F-61C5-48F6-B036-372347CB3EFA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:connect_view_65:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CED7B6B-A318-4956-8E9E-7E9F333F6849", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:lux_85_connect_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "99E734BF-B4FB-46D4-B7D1-D1FBC4D8F59C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:lux_85_connect:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBB23100-4786-4343-97A6-BEE11176B730", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:ease44_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB6A5A5B-2E32-41D4-8077-0146ED2D5015", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:ease44:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D8383CE-EFC9-48DF-98B5-25B37630EBB8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:connect_20_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A367895E-0D4A-4634-97C1-AEEB4266D3D9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:connect_20:-:*:*:*:*:*:*:*", "matchCriteriaId": "496B82F4-9CBB-4F9D-9DFD-DFC1B21D3A7E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:mbp6855_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DEB4430-4E36-4D7E-800E-FFC81CA805FC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:mbp6855:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DAAE13D-6EB2-4029-BC47-2E5D1F490FF2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:cn40_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC267B84-161F-4EE2-8E72-4820F7175B96", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:cn40:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9316C7C-2041-4A1B-A296-4C06DB5E9F89", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:cn75_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7D7AA6CF-7FEE-4ACE-9BD8-383BA30CCB3A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:cn75:-:*:*:*:*:*:*:*", "matchCriteriaId": "00550EB3-E556-48AE-95FA-84F8B0E177C6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An unauthenticated remote code execution vulnerability was reported in some Motorola-branded Binatone Hubble Cameras that could allow an attacker on the same network unauthorized access to the device." }, { "lang": "es", "value": "Se ha informado de una vulnerabilidad de ejecuci\u00f3n de c\u00f3digo remota sin autenticaci\u00f3n en algunas c\u00e1maras Binatone Hubble de la marca Motorola que podr\u00eda permitir a un atacante en la misma red el acceso no autorizado al dispositivo" } ], "id": "CVE-2021-3577", "lastModified": "2024-11-21T06:21:53.310", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "psirt@lenovo.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-12T22:15:07.790", "references": [ { "source": "psirt@lenovo.com", "tags": [ "Vendor Advisory" ], "url": "https://binatoneglobal.com/security-advisory/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://binatoneglobal.com/security-advisory/" } ], "sourceIdentifier": "psirt@lenovo.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "psirt@lenovo.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-863" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
6.5 (Medium) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
▼ | URL | Tags | |
---|---|---|---|
psirt@lenovo.com | https://binatoneglobal.com/security-advisory/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://binatoneglobal.com/security-advisory/ | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:halo\\+_camera_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF4488A5-47D6-41ED-9197-0544B095091A", "versionEndExcluding": "03.50.14", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:halo\\+_camera:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF35A97E-FD84-471F-BAD5-4E7D1573F89E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:comfort_85_connect_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DAB7C8AB-A62A-4585-B6DA-868AB082542E", "versionEndExcluding": "03.40.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:comfort_85_connect:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A24AA60-4C10-4D6B-A5A0-2F26C72844E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:mbp3855_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BCE58D96-4FEC-4214-A164-E5BA7F5B2C29", "versionEndExcluding": "03.40.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:mbp3855:-:*:*:*:*:*:*:*", "matchCriteriaId": "48B956E5-73D0-4286-95B0-BBCFD30E2F4A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:focus_68_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0F3F208-93A5-4CFE-9F7B-E768F039C597", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:focus_68:v100:*:*:*:*:*:*:*", "matchCriteriaId": "2BB7A9FD-152B-4E09-826C-45AF1CAFE105", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:focus_68_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0F3F208-93A5-4CFE-9F7B-E768F039C597", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:focus_68:v200:*:*:*:*:*:*:*", "matchCriteriaId": "80860B5A-DA27-47AD-83CC-4D8ECE938F05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:focus_72r_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "67C7BE1C-0F3F-4559-9100-94B2213DD516", "versionEndExcluding": "03.40.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:focus_72r:v100:*:*:*:*:*:*:*", "matchCriteriaId": "19A8CE00-888A-4A11-BFE2-0A43FFAD7E82", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:focus_72r_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "67C7BE1C-0F3F-4559-9100-94B2213DD516", "versionEndExcluding": "03.40.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:focus_72r:v200:*:*:*:*:*:*:*", "matchCriteriaId": "09EF4092-FBBF-4CC1-9DE6-4E7914BB7D9F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:cn28_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE722C2E-B7D0-44DA-A494-030B6A8CE465", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:cn28:-:*:*:*:*:*:*:*", "matchCriteriaId": "BEFB40A7-64F5-4057-A1C7-483D809F4DC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:cn50_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "39A98169-B314-4C02-B936-ECCC6A224CE1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:cn50:-:*:*:*:*:*:*:*", "matchCriteriaId": "35A2752F-B339-4B61-874E-FDB063EE7468", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:comfort_40_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "34F7D5B9-C1A9-484E-8339-AA2199FD2097", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:comfort_40:-:*:*:*:*:*:*:*", "matchCriteriaId": "86D5680E-9746-405F-B257-6BE5F9457250", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:comfort_50_connect_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5136037-CAE0-4C43-92B6-ED95D9D88EF3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:comfort_50_connect:-:*:*:*:*:*:*:*", "matchCriteriaId": "711AD353-9CC1-40F5-A4BB-6ED9C0EB4436", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:mbp4855_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E41C52F-8993-42EC-A7E7-21830663496B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:mbp4855:-:*:*:*:*:*:*:*", "matchCriteriaId": "62B80F89-A9CA-4CEA-8091-593FE73CA1DA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:mbp3667_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "88CFF394-3622-4E86-BC47-D1050456FB66", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:mbp3667:-:*:*:*:*:*:*:*", "matchCriteriaId": "96B06D2A-47A5-421F-980F-3E31AF89C4AA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:mbp669_connect_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F6BDA58-E9FD-4A4D-AC45-8E62C778247B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:mbp669_connect:-:*:*:*:*:*:*:*", "matchCriteriaId": "C01867E5-A3D4-486B-A49B-1A34E5AB61A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:lux_64_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "13AC5EE6-C75D-46A5-A235-F653E7ABB6E0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:lux_64:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AE5C627-EDAB-4407-90C9-299C2E11969B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:lux_65_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "00E8AB8F-165B-4810-B52B-19B9B1BAD286", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:lux_65:-:*:*:*:*:*:*:*", "matchCriteriaId": "D58F7A0E-6009-4D51-96B3-21774E94A4B5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:connect_view_65_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "019A6C5F-61C5-48F6-B036-372347CB3EFA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:connect_view_65:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CED7B6B-A318-4956-8E9E-7E9F333F6849", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:lux_85_connect_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "99E734BF-B4FB-46D4-B7D1-D1FBC4D8F59C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:lux_85_connect:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBB23100-4786-4343-97A6-BEE11176B730", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:ease44_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB6A5A5B-2E32-41D4-8077-0146ED2D5015", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:ease44:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D8383CE-EFC9-48DF-98B5-25B37630EBB8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:connect_20_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A367895E-0D4A-4634-97C1-AEEB4266D3D9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:connect_20:-:*:*:*:*:*:*:*", "matchCriteriaId": "496B82F4-9CBB-4F9D-9DFD-DFC1B21D3A7E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:mbp6855_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DEB4430-4E36-4D7E-800E-FFC81CA805FC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:mbp6855:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DAAE13D-6EB2-4029-BC47-2E5D1F490FF2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:cn40_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC267B84-161F-4EE2-8E72-4820F7175B96", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:cn40:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9316C7C-2041-4A1B-A296-4C06DB5E9F89", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:cn75_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7D7AA6CF-7FEE-4ACE-9BD8-383BA30CCB3A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:cn75:-:*:*:*:*:*:*:*", "matchCriteriaId": "00550EB3-E556-48AE-95FA-84F8B0E177C6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A buffer overflow was reported in the local web server of some Motorola-branded Binatone Hubble Cameras that could allow an unauthenticated attacker on the same network to perform a denial-of-service attack against the device." }, { "lang": "es", "value": "Se ha informado de un desbordamiento del b\u00fafer en el servidor web local de algunas c\u00e1maras Binatone Hubble de la marca Motorola que podr\u00eda permitir a un atacante no autenticado en la misma red llevar a cabo un ataque de denegaci\u00f3n de servicio contra el dispositivo" } ], "id": "CVE-2021-3790", "lastModified": "2024-11-21T06:22:26.470", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "psirt@lenovo.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-12T22:15:08.317", "references": [ { "source": "psirt@lenovo.com", "tags": [ "Vendor Advisory" ], "url": "https://binatoneglobal.com/security-advisory/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://binatoneglobal.com/security-advisory/" } ], "sourceIdentifier": "psirt@lenovo.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-121" } ], "source": "psirt@lenovo.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
6.8 (Medium) - CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
▼ | URL | Tags | |
---|---|---|---|
psirt@lenovo.com | https://binatoneglobal.com/security-advisory/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://binatoneglobal.com/security-advisory/ | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:halo\\+_camera_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF4488A5-47D6-41ED-9197-0544B095091A", "versionEndExcluding": "03.50.14", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:halo\\+_camera:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF35A97E-FD84-471F-BAD5-4E7D1573F89E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:comfort_85_connect_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DAB7C8AB-A62A-4585-B6DA-868AB082542E", "versionEndExcluding": "03.40.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:comfort_85_connect:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A24AA60-4C10-4D6B-A5A0-2F26C72844E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:mbp3855_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BCE58D96-4FEC-4214-A164-E5BA7F5B2C29", "versionEndExcluding": "03.40.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:mbp3855:-:*:*:*:*:*:*:*", "matchCriteriaId": "48B956E5-73D0-4286-95B0-BBCFD30E2F4A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:focus_68_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0F3F208-93A5-4CFE-9F7B-E768F039C597", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:focus_68:v100:*:*:*:*:*:*:*", "matchCriteriaId": "2BB7A9FD-152B-4E09-826C-45AF1CAFE105", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:focus_68_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0F3F208-93A5-4CFE-9F7B-E768F039C597", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:focus_68:v200:*:*:*:*:*:*:*", "matchCriteriaId": "80860B5A-DA27-47AD-83CC-4D8ECE938F05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:focus_72r_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "67C7BE1C-0F3F-4559-9100-94B2213DD516", "versionEndExcluding": "03.40.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:focus_72r:v100:*:*:*:*:*:*:*", "matchCriteriaId": "19A8CE00-888A-4A11-BFE2-0A43FFAD7E82", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:focus_72r_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "67C7BE1C-0F3F-4559-9100-94B2213DD516", "versionEndExcluding": "03.40.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:focus_72r:v200:*:*:*:*:*:*:*", "matchCriteriaId": "09EF4092-FBBF-4CC1-9DE6-4E7914BB7D9F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:cn28_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE722C2E-B7D0-44DA-A494-030B6A8CE465", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:cn28:-:*:*:*:*:*:*:*", "matchCriteriaId": "BEFB40A7-64F5-4057-A1C7-483D809F4DC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:cn50_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "39A98169-B314-4C02-B936-ECCC6A224CE1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:cn50:-:*:*:*:*:*:*:*", "matchCriteriaId": "35A2752F-B339-4B61-874E-FDB063EE7468", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:comfort_40_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "34F7D5B9-C1A9-484E-8339-AA2199FD2097", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:comfort_40:-:*:*:*:*:*:*:*", "matchCriteriaId": "86D5680E-9746-405F-B257-6BE5F9457250", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:comfort_50_connect_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5136037-CAE0-4C43-92B6-ED95D9D88EF3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:comfort_50_connect:-:*:*:*:*:*:*:*", "matchCriteriaId": "711AD353-9CC1-40F5-A4BB-6ED9C0EB4436", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:mbp4855_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E41C52F-8993-42EC-A7E7-21830663496B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:mbp4855:-:*:*:*:*:*:*:*", "matchCriteriaId": "62B80F89-A9CA-4CEA-8091-593FE73CA1DA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:mbp3667_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "88CFF394-3622-4E86-BC47-D1050456FB66", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:mbp3667:-:*:*:*:*:*:*:*", "matchCriteriaId": "96B06D2A-47A5-421F-980F-3E31AF89C4AA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:mbp669_connect_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F6BDA58-E9FD-4A4D-AC45-8E62C778247B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:mbp669_connect:-:*:*:*:*:*:*:*", "matchCriteriaId": "C01867E5-A3D4-486B-A49B-1A34E5AB61A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:lux_64_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "13AC5EE6-C75D-46A5-A235-F653E7ABB6E0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:lux_64:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AE5C627-EDAB-4407-90C9-299C2E11969B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:lux_65_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "00E8AB8F-165B-4810-B52B-19B9B1BAD286", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:lux_65:-:*:*:*:*:*:*:*", "matchCriteriaId": "D58F7A0E-6009-4D51-96B3-21774E94A4B5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:connect_view_65_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "019A6C5F-61C5-48F6-B036-372347CB3EFA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:connect_view_65:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CED7B6B-A318-4956-8E9E-7E9F333F6849", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:lux_85_connect_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "99E734BF-B4FB-46D4-B7D1-D1FBC4D8F59C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:lux_85_connect:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBB23100-4786-4343-97A6-BEE11176B730", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:ease44_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB6A5A5B-2E32-41D4-8077-0146ED2D5015", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:ease44:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D8383CE-EFC9-48DF-98B5-25B37630EBB8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:connect_20_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A367895E-0D4A-4634-97C1-AEEB4266D3D9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:connect_20:-:*:*:*:*:*:*:*", "matchCriteriaId": "496B82F4-9CBB-4F9D-9DFD-DFC1B21D3A7E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:mbp6855_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DEB4430-4E36-4D7E-800E-FFC81CA805FC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:mbp6855:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DAAE13D-6EB2-4029-BC47-2E5D1F490FF2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:cn40_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC267B84-161F-4EE2-8E72-4820F7175B96", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:cn40:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9316C7C-2041-4A1B-A296-4C06DB5E9F89", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:cn75_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7D7AA6CF-7FEE-4ACE-9BD8-383BA30CCB3A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:cn75:-:*:*:*:*:*:*:*", "matchCriteriaId": "00550EB3-E556-48AE-95FA-84F8B0E177C6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An exposed debug interface was reported in some Motorola-branded Binatone Hubble Cameras that could allow an attacker with physical access unauthorized access to the device." }, { "lang": "es", "value": "En algunas c\u00e1maras Binatone Hubble de la marca Motorola fue reportada una interfaz de depuraci\u00f3n expuesta que podr\u00eda permitir a un atacante con acceso f\u00edsico acceder sin autorizaci\u00f3n al dispositivo" } ], "id": "CVE-2021-3788", "lastModified": "2024-11-21T06:22:26.123", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 5.9, "source": "psirt@lenovo.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-12T22:15:08.213", "references": [ { "source": "psirt@lenovo.com", "tags": [ "Vendor Advisory" ], "url": "https://binatoneglobal.com/security-advisory/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://binatoneglobal.com/security-advisory/" } ], "sourceIdentifier": "psirt@lenovo.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-1299" } ], "source": "psirt@lenovo.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
▼ | URL | Tags | |
---|---|---|---|
psirt@lenovo.com | https://binatoneglobal.com/security-advisory/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://binatoneglobal.com/security-advisory/ | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:halo\\+_camera_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF4488A5-47D6-41ED-9197-0544B095091A", "versionEndExcluding": "03.50.14", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:halo\\+_camera:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF35A97E-FD84-471F-BAD5-4E7D1573F89E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:comfort_85_connect_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DAB7C8AB-A62A-4585-B6DA-868AB082542E", "versionEndExcluding": "03.40.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:comfort_85_connect:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A24AA60-4C10-4D6B-A5A0-2F26C72844E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:mbp3855_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BCE58D96-4FEC-4214-A164-E5BA7F5B2C29", "versionEndExcluding": "03.40.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:mbp3855:-:*:*:*:*:*:*:*", "matchCriteriaId": "48B956E5-73D0-4286-95B0-BBCFD30E2F4A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:focus_68_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0F3F208-93A5-4CFE-9F7B-E768F039C597", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:focus_68:v100:*:*:*:*:*:*:*", "matchCriteriaId": "2BB7A9FD-152B-4E09-826C-45AF1CAFE105", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:focus_68_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0F3F208-93A5-4CFE-9F7B-E768F039C597", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:focus_68:v200:*:*:*:*:*:*:*", "matchCriteriaId": "80860B5A-DA27-47AD-83CC-4D8ECE938F05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:focus_72r_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "67C7BE1C-0F3F-4559-9100-94B2213DD516", "versionEndExcluding": "03.40.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:focus_72r:v100:*:*:*:*:*:*:*", "matchCriteriaId": "19A8CE00-888A-4A11-BFE2-0A43FFAD7E82", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:focus_72r_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "67C7BE1C-0F3F-4559-9100-94B2213DD516", "versionEndExcluding": "03.40.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:focus_72r:v200:*:*:*:*:*:*:*", "matchCriteriaId": "09EF4092-FBBF-4CC1-9DE6-4E7914BB7D9F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:cn28_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE722C2E-B7D0-44DA-A494-030B6A8CE465", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:cn28:-:*:*:*:*:*:*:*", "matchCriteriaId": "BEFB40A7-64F5-4057-A1C7-483D809F4DC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:cn50_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "39A98169-B314-4C02-B936-ECCC6A224CE1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:cn50:-:*:*:*:*:*:*:*", "matchCriteriaId": "35A2752F-B339-4B61-874E-FDB063EE7468", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:comfort_40_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "34F7D5B9-C1A9-484E-8339-AA2199FD2097", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:comfort_40:-:*:*:*:*:*:*:*", "matchCriteriaId": "86D5680E-9746-405F-B257-6BE5F9457250", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:comfort_50_connect_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5136037-CAE0-4C43-92B6-ED95D9D88EF3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:comfort_50_connect:-:*:*:*:*:*:*:*", "matchCriteriaId": "711AD353-9CC1-40F5-A4BB-6ED9C0EB4436", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:mbp4855_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E41C52F-8993-42EC-A7E7-21830663496B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:mbp4855:-:*:*:*:*:*:*:*", "matchCriteriaId": "62B80F89-A9CA-4CEA-8091-593FE73CA1DA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:mbp3667_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "88CFF394-3622-4E86-BC47-D1050456FB66", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:mbp3667:-:*:*:*:*:*:*:*", "matchCriteriaId": "96B06D2A-47A5-421F-980F-3E31AF89C4AA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:mbp669_connect_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F6BDA58-E9FD-4A4D-AC45-8E62C778247B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:mbp669_connect:-:*:*:*:*:*:*:*", "matchCriteriaId": "C01867E5-A3D4-486B-A49B-1A34E5AB61A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:lux_64_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "13AC5EE6-C75D-46A5-A235-F653E7ABB6E0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:lux_64:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AE5C627-EDAB-4407-90C9-299C2E11969B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:lux_65_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "00E8AB8F-165B-4810-B52B-19B9B1BAD286", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:lux_65:-:*:*:*:*:*:*:*", "matchCriteriaId": "D58F7A0E-6009-4D51-96B3-21774E94A4B5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:connect_view_65_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "019A6C5F-61C5-48F6-B036-372347CB3EFA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:connect_view_65:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CED7B6B-A318-4956-8E9E-7E9F333F6849", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:lux_85_connect_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "99E734BF-B4FB-46D4-B7D1-D1FBC4D8F59C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:lux_85_connect:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBB23100-4786-4343-97A6-BEE11176B730", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:ease44_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB6A5A5B-2E32-41D4-8077-0146ED2D5015", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:ease44:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D8383CE-EFC9-48DF-98B5-25B37630EBB8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:connect_20_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A367895E-0D4A-4634-97C1-AEEB4266D3D9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:connect_20:-:*:*:*:*:*:*:*", "matchCriteriaId": "496B82F4-9CBB-4F9D-9DFD-DFC1B21D3A7E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:mbp6855_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DEB4430-4E36-4D7E-800E-FFC81CA805FC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:mbp6855:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DAAE13D-6EB2-4029-BC47-2E5D1F490FF2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:cn40_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC267B84-161F-4EE2-8E72-4820F7175B96", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:cn40:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9316C7C-2041-4A1B-A296-4C06DB5E9F89", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:cn75_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7D7AA6CF-7FEE-4ACE-9BD8-383BA30CCB3A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:cn75:-:*:*:*:*:*:*:*", "matchCriteriaId": "00550EB3-E556-48AE-95FA-84F8B0E177C6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Some device communications in some Motorola-branded Binatone Hubble Cameras with backend Hubble services are not encrypted which could lead to the communication channel being accessible by an attacker." }, { "lang": "es", "value": "Algunas comunicaciones del dispositivo en algunas C\u00e1maras Binatone Hubble de la marca Motorola con los servicios backend Hubble no est\u00e1n encriptadas lo que podr\u00eda conllevar a que el canal de comunicaci\u00f3n fuera accesible por un atacante" } ], "id": "CVE-2021-3792", "lastModified": "2024-11-21T06:22:26.823", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "psirt@lenovo.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-12T22:15:08.420", "references": [ { "source": "psirt@lenovo.com", "tags": [ "Vendor Advisory" ], "url": "https://binatoneglobal.com/security-advisory/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://binatoneglobal.com/security-advisory/" } ], "sourceIdentifier": "psirt@lenovo.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-319" } ], "source": "psirt@lenovo.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-319" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
▼ | URL | Tags | |
---|---|---|---|
psirt@lenovo.com | https://binatoneglobal.com/security-advisory/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://binatoneglobal.com/security-advisory/ | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:halo\\+_camera_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF4488A5-47D6-41ED-9197-0544B095091A", "versionEndExcluding": "03.50.14", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:halo\\+_camera:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF35A97E-FD84-471F-BAD5-4E7D1573F89E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:comfort_85_connect_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DAB7C8AB-A62A-4585-B6DA-868AB082542E", "versionEndExcluding": "03.40.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:comfort_85_connect:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A24AA60-4C10-4D6B-A5A0-2F26C72844E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:mbp3855_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BCE58D96-4FEC-4214-A164-E5BA7F5B2C29", "versionEndExcluding": "03.40.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:mbp3855:-:*:*:*:*:*:*:*", "matchCriteriaId": "48B956E5-73D0-4286-95B0-BBCFD30E2F4A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:focus_68_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0F3F208-93A5-4CFE-9F7B-E768F039C597", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:focus_68:v100:*:*:*:*:*:*:*", "matchCriteriaId": "2BB7A9FD-152B-4E09-826C-45AF1CAFE105", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:focus_68_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0F3F208-93A5-4CFE-9F7B-E768F039C597", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:focus_68:v200:*:*:*:*:*:*:*", "matchCriteriaId": "80860B5A-DA27-47AD-83CC-4D8ECE938F05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:focus_72r_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "67C7BE1C-0F3F-4559-9100-94B2213DD516", "versionEndExcluding": "03.40.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:focus_72r:v100:*:*:*:*:*:*:*", "matchCriteriaId": "19A8CE00-888A-4A11-BFE2-0A43FFAD7E82", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:focus_72r_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "67C7BE1C-0F3F-4559-9100-94B2213DD516", "versionEndExcluding": "03.40.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:focus_72r:v200:*:*:*:*:*:*:*", "matchCriteriaId": "09EF4092-FBBF-4CC1-9DE6-4E7914BB7D9F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:cn28_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE722C2E-B7D0-44DA-A494-030B6A8CE465", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:cn28:-:*:*:*:*:*:*:*", "matchCriteriaId": "BEFB40A7-64F5-4057-A1C7-483D809F4DC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:cn50_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "39A98169-B314-4C02-B936-ECCC6A224CE1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:cn50:-:*:*:*:*:*:*:*", "matchCriteriaId": "35A2752F-B339-4B61-874E-FDB063EE7468", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:comfort_40_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "34F7D5B9-C1A9-484E-8339-AA2199FD2097", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:comfort_40:-:*:*:*:*:*:*:*", "matchCriteriaId": "86D5680E-9746-405F-B257-6BE5F9457250", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:comfort_50_connect_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5136037-CAE0-4C43-92B6-ED95D9D88EF3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:comfort_50_connect:-:*:*:*:*:*:*:*", "matchCriteriaId": "711AD353-9CC1-40F5-A4BB-6ED9C0EB4436", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:mbp4855_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E41C52F-8993-42EC-A7E7-21830663496B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:mbp4855:-:*:*:*:*:*:*:*", "matchCriteriaId": "62B80F89-A9CA-4CEA-8091-593FE73CA1DA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:mbp3667_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "88CFF394-3622-4E86-BC47-D1050456FB66", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:mbp3667:-:*:*:*:*:*:*:*", "matchCriteriaId": "96B06D2A-47A5-421F-980F-3E31AF89C4AA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:mbp669_connect_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F6BDA58-E9FD-4A4D-AC45-8E62C778247B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:mbp669_connect:-:*:*:*:*:*:*:*", "matchCriteriaId": "C01867E5-A3D4-486B-A49B-1A34E5AB61A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:lux_64_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "13AC5EE6-C75D-46A5-A235-F653E7ABB6E0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:lux_64:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AE5C627-EDAB-4407-90C9-299C2E11969B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:lux_65_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "00E8AB8F-165B-4810-B52B-19B9B1BAD286", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:lux_65:-:*:*:*:*:*:*:*", "matchCriteriaId": "D58F7A0E-6009-4D51-96B3-21774E94A4B5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:connect_view_65_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "019A6C5F-61C5-48F6-B036-372347CB3EFA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:connect_view_65:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CED7B6B-A318-4956-8E9E-7E9F333F6849", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:lux_85_connect_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "99E734BF-B4FB-46D4-B7D1-D1FBC4D8F59C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:lux_85_connect:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBB23100-4786-4343-97A6-BEE11176B730", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:ease44_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB6A5A5B-2E32-41D4-8077-0146ED2D5015", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:ease44:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D8383CE-EFC9-48DF-98B5-25B37630EBB8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:connect_20_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A367895E-0D4A-4634-97C1-AEEB4266D3D9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:connect_20:-:*:*:*:*:*:*:*", "matchCriteriaId": "496B82F4-9CBB-4F9D-9DFD-DFC1B21D3A7E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:mbp6855_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DEB4430-4E36-4D7E-800E-FFC81CA805FC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:mbp6855:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DAAE13D-6EB2-4029-BC47-2E5D1F490FF2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:cn40_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC267B84-161F-4EE2-8E72-4820F7175B96", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:cn40:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9316C7C-2041-4A1B-A296-4C06DB5E9F89", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:cn75_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7D7AA6CF-7FEE-4ACE-9BD8-383BA30CCB3A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:cn75:-:*:*:*:*:*:*:*", "matchCriteriaId": "00550EB3-E556-48AE-95FA-84F8B0E177C6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was reported in some Motorola-branded Binatone Hubble Cameras that could allow an attacker with local access to obtain the MQTT credentials that could result in unauthorized access to backend Hubble services." }, { "lang": "es", "value": "Se ha informado de una vulnerabilidad en algunas c\u00e1maras Binatone Hubble de la marca Motorola que podr\u00eda permitir a un atacante con acceso local obtener las credenciales MQTT que podr\u00edan resultar en un acceso no autorizado a los servicios backend de Hubble" } ], "id": "CVE-2021-3787", "lastModified": "2024-11-21T06:22:25.940", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.5, "impactScore": 5.9, "source": "psirt@lenovo.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-12T22:15:08.163", "references": [ { "source": "psirt@lenovo.com", "tags": [ "Vendor Advisory" ], "url": "https://binatoneglobal.com/security-advisory/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://binatoneglobal.com/security-advisory/" } ], "sourceIdentifier": "psirt@lenovo.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-256" } ], "source": "psirt@lenovo.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
▼ | URL | Tags | |
---|---|---|---|
psirt@lenovo.com | https://binatoneglobal.com/security-advisory/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://binatoneglobal.com/security-advisory/ | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:halo\\+_camera_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF4488A5-47D6-41ED-9197-0544B095091A", "versionEndExcluding": "03.50.14", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:halo\\+_camera:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF35A97E-FD84-471F-BAD5-4E7D1573F89E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:comfort_85_connect_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DAB7C8AB-A62A-4585-B6DA-868AB082542E", "versionEndExcluding": "03.40.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:comfort_85_connect:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A24AA60-4C10-4D6B-A5A0-2F26C72844E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:mbp3855_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BCE58D96-4FEC-4214-A164-E5BA7F5B2C29", "versionEndExcluding": "03.40.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:mbp3855:-:*:*:*:*:*:*:*", "matchCriteriaId": "48B956E5-73D0-4286-95B0-BBCFD30E2F4A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:focus_68_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0F3F208-93A5-4CFE-9F7B-E768F039C597", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:focus_68:v100:*:*:*:*:*:*:*", "matchCriteriaId": "2BB7A9FD-152B-4E09-826C-45AF1CAFE105", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:focus_68_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0F3F208-93A5-4CFE-9F7B-E768F039C597", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:focus_68:v200:*:*:*:*:*:*:*", "matchCriteriaId": "80860B5A-DA27-47AD-83CC-4D8ECE938F05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:focus_72r_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "67C7BE1C-0F3F-4559-9100-94B2213DD516", "versionEndExcluding": "03.40.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:focus_72r:v100:*:*:*:*:*:*:*", "matchCriteriaId": "19A8CE00-888A-4A11-BFE2-0A43FFAD7E82", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:focus_72r_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "67C7BE1C-0F3F-4559-9100-94B2213DD516", "versionEndExcluding": "03.40.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:focus_72r:v200:*:*:*:*:*:*:*", "matchCriteriaId": "09EF4092-FBBF-4CC1-9DE6-4E7914BB7D9F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:cn28_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE722C2E-B7D0-44DA-A494-030B6A8CE465", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:cn28:-:*:*:*:*:*:*:*", "matchCriteriaId": "BEFB40A7-64F5-4057-A1C7-483D809F4DC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:cn50_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "39A98169-B314-4C02-B936-ECCC6A224CE1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:cn50:-:*:*:*:*:*:*:*", "matchCriteriaId": "35A2752F-B339-4B61-874E-FDB063EE7468", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:comfort_40_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "34F7D5B9-C1A9-484E-8339-AA2199FD2097", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:comfort_40:-:*:*:*:*:*:*:*", "matchCriteriaId": "86D5680E-9746-405F-B257-6BE5F9457250", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:comfort_50_connect_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5136037-CAE0-4C43-92B6-ED95D9D88EF3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:comfort_50_connect:-:*:*:*:*:*:*:*", "matchCriteriaId": "711AD353-9CC1-40F5-A4BB-6ED9C0EB4436", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:mbp4855_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E41C52F-8993-42EC-A7E7-21830663496B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:mbp4855:-:*:*:*:*:*:*:*", "matchCriteriaId": "62B80F89-A9CA-4CEA-8091-593FE73CA1DA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:mbp3667_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "88CFF394-3622-4E86-BC47-D1050456FB66", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:mbp3667:-:*:*:*:*:*:*:*", "matchCriteriaId": "96B06D2A-47A5-421F-980F-3E31AF89C4AA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:mbp669_connect_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F6BDA58-E9FD-4A4D-AC45-8E62C778247B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:mbp669_connect:-:*:*:*:*:*:*:*", "matchCriteriaId": "C01867E5-A3D4-486B-A49B-1A34E5AB61A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:lux_64_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "13AC5EE6-C75D-46A5-A235-F653E7ABB6E0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:lux_64:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AE5C627-EDAB-4407-90C9-299C2E11969B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:lux_65_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "00E8AB8F-165B-4810-B52B-19B9B1BAD286", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:lux_65:-:*:*:*:*:*:*:*", "matchCriteriaId": "D58F7A0E-6009-4D51-96B3-21774E94A4B5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:connect_view_65_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "019A6C5F-61C5-48F6-B036-372347CB3EFA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:connect_view_65:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CED7B6B-A318-4956-8E9E-7E9F333F6849", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:lux_85_connect_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "99E734BF-B4FB-46D4-B7D1-D1FBC4D8F59C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:lux_85_connect:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBB23100-4786-4343-97A6-BEE11176B730", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:ease44_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB6A5A5B-2E32-41D4-8077-0146ED2D5015", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:ease44:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D8383CE-EFC9-48DF-98B5-25B37630EBB8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:connect_20_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A367895E-0D4A-4634-97C1-AEEB4266D3D9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:connect_20:-:*:*:*:*:*:*:*", "matchCriteriaId": "496B82F4-9CBB-4F9D-9DFD-DFC1B21D3A7E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:mbp6855_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DEB4430-4E36-4D7E-800E-FFC81CA805FC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:mbp6855:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DAAE13D-6EB2-4029-BC47-2E5D1F490FF2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:cn40_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC267B84-161F-4EE2-8E72-4820F7175B96", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:cn40:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9316C7C-2041-4A1B-A296-4C06DB5E9F89", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:binatoneglobal:cn75_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7D7AA6CF-7FEE-4ACE-9BD8-383BA30CCB3A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:binatoneglobal:cn75:-:*:*:*:*:*:*:*", "matchCriteriaId": "00550EB3-E556-48AE-95FA-84F8B0E177C6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper access control vulnerability was reported in some Motorola-branded Binatone Hubble Cameras which could allow an unauthenticated attacker on the same network as the device to access administrative pages that could result in information disclosure or device firmware update with verified firmware." }, { "lang": "es", "value": "Se ha informado de una vulnerabilidad de control de acceso inapropiada en algunas c\u00e1maras Binatone Hubble de la marca Motorola que podr\u00eda permitir a un atacante no autenticado en la misma red que el dispositivo acceder a p\u00e1ginas administrativas que podr\u00edan resultar en una divulgaci\u00f3n de informaci\u00f3n o a la actualizaci\u00f3n del firmware del dispositivo con firmware verificado" } ], "id": "CVE-2021-3793", "lastModified": "2024-11-21T06:22:27.000", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 2.5, "source": "psirt@lenovo.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-12T22:15:08.473", "references": [ { "source": "psirt@lenovo.com", "tags": [ "Vendor Advisory" ], "url": "https://binatoneglobal.com/security-advisory/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://binatoneglobal.com/security-advisory/" } ], "sourceIdentifier": "psirt@lenovo.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-424" } ], "source": "psirt@lenovo.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2021-3791
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://binatoneglobal.com/security-advisory/ | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
Motorola | Binatone Hubble Cameras |
Version: various |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T17:09:08.947Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://binatoneglobal.com/security-advisory/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Binatone Hubble Cameras", "vendor": "Motorola", "versions": [ { "status": "affected", "version": "various" } ] } ], "credits": [ { "lang": "en", "value": "Motorola thanks Lennert Wouters and G\u00fcnes Acar, imec-COSIC, KU Leuven, Belgium for reporting this issue." } ], "descriptions": [ { "lang": "en", "value": "An information disclosure vulnerability was reported in some Motorola-branded Binatone Hubble Cameras that could allow an unauthenticated attacker on the same subnet to download an encrypted log file containing sensitive information such as WiFi SSID and password." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-532", "description": "CWE-532 Information Exposure Through Log Files", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-12T22:05:49", "orgId": "da227ddf-6e25-4b41-b023-0f976dcaca4b", "shortName": "lenovo" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://binatoneglobal.com/security-advisory/" } ], "solutions": [ { "lang": "en", "value": "Update to the camera firmware version (or newer version) indicated in the Product Impact section of the Binatone Security Advisory: https://binatoneglobal.com/security-advisory/." } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@lenovo.com", "ID": "CVE-2021-3791", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Binatone Hubble Cameras", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } } ] }, "vendor_name": "Motorola" } ] } }, "credit": [ { "lang": "eng", "value": "Motorola thanks Lennert Wouters and G\u00fcnes Acar, imec-COSIC, KU Leuven, Belgium for reporting this issue." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An information disclosure vulnerability was reported in some Motorola-branded Binatone Hubble Cameras that could allow an unauthenticated attacker on the same subnet to download an encrypted log file containing sensitive information such as WiFi SSID and password." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-532 Information Exposure Through Log Files" } ] } ] }, "references": { "reference_data": [ { "name": "https://binatoneglobal.com/security-advisory/", "refsource": "MISC", "url": "https://binatoneglobal.com/security-advisory/" } ] }, "solution": [ { "lang": "en", "value": "Update to the camera firmware version (or newer version) indicated in the Product Impact section of the Binatone Security Advisory: https://binatoneglobal.com/security-advisory/." } ], "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "da227ddf-6e25-4b41-b023-0f976dcaca4b", "assignerShortName": "lenovo", "cveId": "CVE-2021-3791", "datePublished": "2021-11-12T22:05:49", "dateReserved": "2021-09-09T00:00:00", "dateUpdated": "2024-08-03T17:09:08.947Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-3792
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://binatoneglobal.com/security-advisory/ | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
Motorola | Binatone Hubble Cameras |
Version: various |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T17:09:08.853Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://binatoneglobal.com/security-advisory/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Binatone Hubble Cameras", "vendor": "Motorola", "versions": [ { "status": "affected", "version": "various" } ] } ], "credits": [ { "lang": "en", "value": "Motorola thanks Lenovo Global Security Lab for reporting these issues." } ], "descriptions": [ { "lang": "en", "value": "Some device communications in some Motorola-branded Binatone Hubble Cameras with backend Hubble services are not encrypted which could lead to the communication channel being accessible by an attacker." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-319", "description": "CWE-319 Cleartext Transmission of Sensitive Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-12T22:05:51", "orgId": "da227ddf-6e25-4b41-b023-0f976dcaca4b", "shortName": "lenovo" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://binatoneglobal.com/security-advisory/" } ], "solutions": [ { "lang": "en", "value": "Update to the camera firmware version (or newer version) indicated in the Product Impact section of the Binatone Security Advisory: https://binatoneglobal.com/security-advisory/." } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@lenovo.com", "ID": "CVE-2021-3792", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Binatone Hubble Cameras", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } } ] }, "vendor_name": "Motorola" } ] } }, "credit": [ { "lang": "eng", "value": "Motorola thanks Lenovo Global Security Lab for reporting these issues." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Some device communications in some Motorola-branded Binatone Hubble Cameras with backend Hubble services are not encrypted which could lead to the communication channel being accessible by an attacker." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-319 Cleartext Transmission of Sensitive Information" } ] } ] }, "references": { "reference_data": [ { "name": "https://binatoneglobal.com/security-advisory/", "refsource": "MISC", "url": "https://binatoneglobal.com/security-advisory/" } ] }, "solution": [ { "lang": "en", "value": "Update to the camera firmware version (or newer version) indicated in the Product Impact section of the Binatone Security Advisory: https://binatoneglobal.com/security-advisory/." } ], "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "da227ddf-6e25-4b41-b023-0f976dcaca4b", "assignerShortName": "lenovo", "cveId": "CVE-2021-3792", "datePublished": "2021-11-12T22:05:51", "dateReserved": "2021-09-09T00:00:00", "dateUpdated": "2024-08-03T17:09:08.853Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-3793
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://binatoneglobal.com/security-advisory/ | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
Motorola | Binatone Hubble Cameras |
Version: various |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T17:09:08.614Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://binatoneglobal.com/security-advisory/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Binatone Hubble Cameras", "vendor": "Motorola", "versions": [ { "status": "affected", "version": "various" } ] } ], "credits": [ { "lang": "en", "value": "Motorola thanks Lenovo Global Security Lab for reporting these issues." } ], "descriptions": [ { "lang": "en", "value": "An improper access control vulnerability was reported in some Motorola-branded Binatone Hubble Cameras which could allow an unauthenticated attacker on the same network as the device to access administrative pages that could result in information disclosure or device firmware update with verified firmware." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-424", "description": "CWE-424 Improper Protection of Alternate Path", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-12T22:05:52", "orgId": "da227ddf-6e25-4b41-b023-0f976dcaca4b", "shortName": "lenovo" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://binatoneglobal.com/security-advisory/" } ], "solutions": [ { "lang": "en", "value": "Update to the camera firmware version (or newer version) indicated in the Product Impact section of the Binatone Security Advisory: https://binatoneglobal.com/security-advisory/." } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@lenovo.com", "ID": "CVE-2021-3793", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Binatone Hubble Cameras", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } } ] }, "vendor_name": "Motorola" } ] } }, "credit": [ { "lang": "eng", "value": "Motorola thanks Lenovo Global Security Lab for reporting these issues." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An improper access control vulnerability was reported in some Motorola-branded Binatone Hubble Cameras which could allow an unauthenticated attacker on the same network as the device to access administrative pages that could result in information disclosure or device firmware update with verified firmware." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-424 Improper Protection of Alternate Path" } ] } ] }, "references": { "reference_data": [ { "name": "https://binatoneglobal.com/security-advisory/", "refsource": "MISC", "url": "https://binatoneglobal.com/security-advisory/" } ] }, "solution": [ { "lang": "en", "value": "Update to the camera firmware version (or newer version) indicated in the Product Impact section of the Binatone Security Advisory: https://binatoneglobal.com/security-advisory/." } ], "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "da227ddf-6e25-4b41-b023-0f976dcaca4b", "assignerShortName": "lenovo", "cveId": "CVE-2021-3793", "datePublished": "2021-11-12T22:05:52", "dateReserved": "2021-09-09T00:00:00", "dateUpdated": "2024-08-03T17:09:08.614Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-3787
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://binatoneglobal.com/security-advisory/ | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
Motorola | Binatone Hubble Cameras |
Version: various |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T17:09:08.656Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://binatoneglobal.com/security-advisory/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Binatone Hubble Cameras", "vendor": "Motorola", "versions": [ { "status": "affected", "version": "various" } ] } ], "credits": [ { "lang": "en", "value": "Motorola thanks Randy Westergren for reporting this issue." } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was reported in some Motorola-branded Binatone Hubble Cameras that could allow an attacker with local access to obtain the MQTT credentials that could result in unauthorized access to backend Hubble services." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-256", "description": "CWE-256 Unprotected Storage of Credentials", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-12T22:05:43", "orgId": "da227ddf-6e25-4b41-b023-0f976dcaca4b", "shortName": "lenovo" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://binatoneglobal.com/security-advisory/" } ], "solutions": [ { "lang": "en", "value": "Update to the camera firmware version (or newer version) indicated in the Product Impact section of the Binatone Security Advisory: https://binatoneglobal.com/security-advisory/." } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@lenovo.com", "ID": "CVE-2021-3787", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Binatone Hubble Cameras", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } } ] }, "vendor_name": "Motorola" } ] } }, "credit": [ { "lang": "eng", "value": "Motorola thanks Randy Westergren for reporting this issue." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability was reported in some Motorola-branded Binatone Hubble Cameras that could allow an attacker with local access to obtain the MQTT credentials that could result in unauthorized access to backend Hubble services." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-256 Unprotected Storage of Credentials" } ] } ] }, "references": { "reference_data": [ { "name": "https://binatoneglobal.com/security-advisory/", "refsource": "MISC", "url": "https://binatoneglobal.com/security-advisory/" } ] }, "solution": [ { "lang": "en", "value": "Update to the camera firmware version (or newer version) indicated in the Product Impact section of the Binatone Security Advisory: https://binatoneglobal.com/security-advisory/." } ], "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "da227ddf-6e25-4b41-b023-0f976dcaca4b", "assignerShortName": "lenovo", "cveId": "CVE-2021-3787", "datePublished": "2021-11-12T22:05:43", "dateReserved": "2021-09-09T00:00:00", "dateUpdated": "2024-08-03T17:09:08.656Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-3577
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://binatoneglobal.com/security-advisory/ | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
Motorola | Binatone Hubble Cameras |
Version: various |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T17:01:07.325Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://binatoneglobal.com/security-advisory/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Binatone Hubble Cameras", "vendor": "Motorola", "versions": [ { "status": "affected", "version": "various" } ] } ], "credits": [ { "lang": "en", "value": "Motorola thanks Randy Westergren for reporting this issue." } ], "descriptions": [ { "lang": "en", "value": "An unauthenticated remote code execution vulnerability was reported in some Motorola-branded Binatone Hubble Cameras that could allow an attacker on the same network unauthorized access to the device." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 OS Command Injection", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-12T22:05:31", "orgId": "da227ddf-6e25-4b41-b023-0f976dcaca4b", "shortName": "lenovo" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://binatoneglobal.com/security-advisory/" } ], "solutions": [ { "lang": "en", "value": "Update to the camera firmware version (or newer version) indicated in the Product Impact section of the Binatone Security Advisory: https://binatoneglobal.com/security-advisory/." } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@lenovo.com", "ID": "CVE-2021-3577", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Binatone Hubble Cameras", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } } ] }, "vendor_name": "Motorola" } ] } }, "credit": [ { "lang": "eng", "value": "Motorola thanks Randy Westergren for reporting this issue." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An unauthenticated remote code execution vulnerability was reported in some Motorola-branded Binatone Hubble Cameras that could allow an attacker on the same network unauthorized access to the device." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-78 OS Command Injection" } ] } ] }, "references": { "reference_data": [ { "name": "https://binatoneglobal.com/security-advisory/", "refsource": "MISC", "url": "https://binatoneglobal.com/security-advisory/" } ] }, "solution": [ { "lang": "en", "value": "Update to the camera firmware version (or newer version) indicated in the Product Impact section of the Binatone Security Advisory: https://binatoneglobal.com/security-advisory/." } ], "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "da227ddf-6e25-4b41-b023-0f976dcaca4b", "assignerShortName": "lenovo", "cveId": "CVE-2021-3577", "datePublished": "2021-11-12T22:05:31", "dateReserved": "2021-06-02T00:00:00", "dateUpdated": "2024-08-03T17:01:07.325Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-3789
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://binatoneglobal.com/security-advisory/ | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
Motorola | Binatone Hubble Cameras |
Version: various |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T17:09:08.966Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://binatoneglobal.com/security-advisory/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Binatone Hubble Cameras", "vendor": "Motorola", "versions": [ { "status": "affected", "version": "various" } ] } ], "credits": [ { "lang": "en", "value": "Motorola thanks Lennert Wouters and G\u00fcnes Acar, imec-COSIC, KU Leuven, Belgium for reporting this issue." } ], "descriptions": [ { "lang": "en", "value": "An information disclosure vulnerability was reported in some Motorola-branded Binatone Hubble Cameras that could allow an attacker with physical access to obtain the encryption key used to decrypt firmware update packages." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-522", "description": "CWE-522 Insufficiently Protected Credentials", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-12T22:05:46", "orgId": "da227ddf-6e25-4b41-b023-0f976dcaca4b", "shortName": "lenovo" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://binatoneglobal.com/security-advisory/" } ], "solutions": [ { "lang": "en", "value": "Update to the camera firmware version (or newer version) indicated in the Product Impact section of the Binatone Security Advisory: https://binatoneglobal.com/security-advisory/." } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@lenovo.com", "ID": "CVE-2021-3789", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Binatone Hubble Cameras", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } } ] }, "vendor_name": "Motorola" } ] } }, "credit": [ { "lang": "eng", "value": "Motorola thanks Lennert Wouters and G\u00fcnes Acar, imec-COSIC, KU Leuven, Belgium for reporting this issue." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An information disclosure vulnerability was reported in some Motorola-branded Binatone Hubble Cameras that could allow an attacker with physical access to obtain the encryption key used to decrypt firmware update packages." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-522 Insufficiently Protected Credentials" } ] } ] }, "references": { "reference_data": [ { "name": "https://binatoneglobal.com/security-advisory/", "refsource": "MISC", "url": "https://binatoneglobal.com/security-advisory/" } ] }, "solution": [ { "lang": "en", "value": "Update to the camera firmware version (or newer version) indicated in the Product Impact section of the Binatone Security Advisory: https://binatoneglobal.com/security-advisory/." } ], "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "da227ddf-6e25-4b41-b023-0f976dcaca4b", "assignerShortName": "lenovo", "cveId": "CVE-2021-3789", "datePublished": "2021-11-12T22:05:46", "dateReserved": "2021-09-09T00:00:00", "dateUpdated": "2024-08-03T17:09:08.966Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-3788
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://binatoneglobal.com/security-advisory/ | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
Motorola | Binatone Hubble Cameras |
Version: various |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T17:09:09.312Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://binatoneglobal.com/security-advisory/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Binatone Hubble Cameras", "vendor": "Motorola", "versions": [ { "status": "affected", "version": "various" } ] } ], "credits": [ { "lang": "en", "value": "Motorola thanks Lennert Wouters and G\u00fcnes Acar, imec-COSIC, KU Leuven, Belgium for reporting this issue." } ], "descriptions": [ { "lang": "en", "value": "An exposed debug interface was reported in some Motorola-branded Binatone Hubble Cameras that could allow an attacker with physical access unauthorized access to the device." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1299", "description": "CWE-1299: Missing Protection Mechanism for Alternate Hardware Interface", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-12T22:05:44", "orgId": "da227ddf-6e25-4b41-b023-0f976dcaca4b", "shortName": "lenovo" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://binatoneglobal.com/security-advisory/" } ], "solutions": [ { "lang": "en", "value": "Update to the camera firmware version (or newer version) indicated in the Product Impact section of the Binatone Security Advisory: https://binatoneglobal.com/security-advisory/." } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@lenovo.com", "ID": "CVE-2021-3788", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Binatone Hubble Cameras", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } } ] }, "vendor_name": "Motorola" } ] } }, "credit": [ { "lang": "eng", "value": "Motorola thanks Lennert Wouters and G\u00fcnes Acar, imec-COSIC, KU Leuven, Belgium for reporting this issue." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An exposed debug interface was reported in some Motorola-branded Binatone Hubble Cameras that could allow an attacker with physical access unauthorized access to the device." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-1299: Missing Protection Mechanism for Alternate Hardware Interface" } ] } ] }, "references": { "reference_data": [ { "name": "https://binatoneglobal.com/security-advisory/", "refsource": "MISC", "url": "https://binatoneglobal.com/security-advisory/" } ] }, "solution": [ { "lang": "en", "value": "Update to the camera firmware version (or newer version) indicated in the Product Impact section of the Binatone Security Advisory: https://binatoneglobal.com/security-advisory/." } ], "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "da227ddf-6e25-4b41-b023-0f976dcaca4b", "assignerShortName": "lenovo", "cveId": "CVE-2021-3788", "datePublished": "2021-11-12T22:05:44", "dateReserved": "2021-09-09T00:00:00", "dateUpdated": "2024-08-03T17:09:09.312Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-3790
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://binatoneglobal.com/security-advisory/ | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
Motorola | Binatone Hubble Cameras |
Version: various |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T17:09:08.814Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://binatoneglobal.com/security-advisory/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Binatone Hubble Cameras", "vendor": "Motorola", "versions": [ { "status": "affected", "version": "various" } ] } ], "credits": [ { "lang": "en", "value": "Motorola thanks Lennert Wouters and G\u00fcnes Acar, imec-COSIC, KU Leuven, Belgium for reporting this issue." } ], "descriptions": [ { "lang": "en", "value": "A buffer overflow was reported in the local web server of some Motorola-branded Binatone Hubble Cameras that could allow an unauthenticated attacker on the same network to perform a denial-of-service attack against the device." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "CWE-121 Stack-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-12T22:05:47", "orgId": "da227ddf-6e25-4b41-b023-0f976dcaca4b", "shortName": "lenovo" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://binatoneglobal.com/security-advisory/" } ], "solutions": [ { "lang": "en", "value": "Update to the camera firmware version (or newer version) indicated in the Product Impact section of the Binatone Security Advisory: https://binatoneglobal.com/security-advisory/." } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@lenovo.com", "ID": "CVE-2021-3790", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Binatone Hubble Cameras", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } } ] }, "vendor_name": "Motorola" } ] } }, "credit": [ { "lang": "eng", "value": "Motorola thanks Lennert Wouters and G\u00fcnes Acar, imec-COSIC, KU Leuven, Belgium for reporting this issue." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A buffer overflow was reported in the local web server of some Motorola-branded Binatone Hubble Cameras that could allow an unauthenticated attacker on the same network to perform a denial-of-service attack against the device." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-121 Stack-based Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://binatoneglobal.com/security-advisory/", "refsource": "MISC", "url": "https://binatoneglobal.com/security-advisory/" } ] }, "solution": [ { "lang": "en", "value": "Update to the camera firmware version (or newer version) indicated in the Product Impact section of the Binatone Security Advisory: https://binatoneglobal.com/security-advisory/." } ], "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "da227ddf-6e25-4b41-b023-0f976dcaca4b", "assignerShortName": "lenovo", "cveId": "CVE-2021-3790", "datePublished": "2021-11-12T22:05:48", "dateReserved": "2021-09-09T00:00:00", "dateUpdated": "2024-08-03T17:09:08.814Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }