All the vulnerabilites related to samsung - m288ofw
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
samsung | nt14u_firmware | t-nt14uakucb-1008.0 | |
samsung | nt14u_us | - | |
samsung | x14j_firmware | t-ms14jakucb-1102.5 | |
samsung | x14j_us | - | |
samsung | x14h_firmware | t-mst14dcncb-1010.0 | |
samsung | x14h_cn | - | |
samsung | x12_firmware | t-mst12akucb-1114.0 | |
samsung | x12_us | - | |
samsung | x10p_firmware | t-mst10pibrcb-1104.0 | |
samsung | x10p_ibr | - | |
samsung | nt14u_firmware | t-nt14udeucb-1007.1 | |
samsung | nt14u_eu | - | |
samsung | nt14u_firmware | t-nt14udcncb-1003.1 | |
samsung | nt14u_cn | - | |
samsung | x14j_firmware | t-ms14jdeucb-1018.0 | |
samsung | x14j_eu | - | |
samsung | x14j_firmware | t-ms14jdcncb-1004.2 | |
samsung | x14j_cn | - | |
samsung | x14h_firmware | t-mst14akucb-1100.4 | |
samsung | x14h_us | - | |
samsung | x14h_firmware | t-mst14deucb-1023.0 | |
samsung | x14h_eu | - | |
samsung | x12_firmware | t-mst12deucb-1111.4 | |
samsung | x12_eu | - | |
samsung | x10p_firmware | t-mst10pauscp-1302.0 | |
samsung | x10p_us | - | |
samsung | x10p_firmware | t-mst10pdeucb-1210.0 | |
samsung | x10p_eu | - | |
samsung | m288ofw_firmware | - | |
samsung | m288ofw | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:nt14u_firmware:t-nt14uakucb-1008.0:*:*:*:*:*:*:*", "matchCriteriaId": "323D8E86-D758-4B1A-8F48-7F34AD60C4EB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:nt14u_us:-:*:*:*:*:*:*:*", "matchCriteriaId": "E79C9FDC-8352-4DB2-8E7D-39C0F52165B1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:x14j_firmware:t-ms14jakucb-1102.5:*:*:*:*:*:*:*", "matchCriteriaId": "3A5867B4-EC19-45D4-87BE-867E1D41ECD5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:x14j_us:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FDE7649-FFFF-4577-AFE2-B2A689E128FF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:x14h_firmware:t-mst14dcncb-1010.0:*:*:*:*:*:*:*", "matchCriteriaId": "F37E9EF9-52E0-4CB8-B33A-8A624EBEC0C3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:x14h_cn:-:*:*:*:*:*:*:*", "matchCriteriaId": "78A90629-6CC3-4765-A603-4D25A704710A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:x12_firmware:t-mst12akucb-1114.0:*:*:*:*:*:*:*", "matchCriteriaId": "37061C66-CDF1-4AC2-8398-2E08E5A3CF7F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:x12_us:-:*:*:*:*:*:*:*", "matchCriteriaId": "6099C402-C71B-4D3B-BDCD-B5C58DCEE8CB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:x10p_firmware:t-mst10pibrcb-1104.0:*:*:*:*:*:*:*", "matchCriteriaId": "E438852D-E230-4586-B9AD-C979F8A8C2C5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:x10p_ibr:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8181FF8-7C8F-4E10-AD37-3ED2924587F6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:nt14u_firmware:t-nt14udeucb-1007.1:*:*:*:*:*:*:*", "matchCriteriaId": "E61113A9-117C-42DB-90BA-44B574BF9037", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:nt14u_eu:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C880508-E44C-48D9-B9A3-F8C4793DFE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:nt14u_firmware:t-nt14udcncb-1003.1:*:*:*:*:*:*:*", "matchCriteriaId": "4370F4FE-B9FE-4E20-AB98-DF9DB07DC113", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:nt14u_cn:-:*:*:*:*:*:*:*", "matchCriteriaId": "813189AB-7922-43C8-98EA-DC1E16F33D40", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:x14j_firmware:t-ms14jdeucb-1018.0:*:*:*:*:*:*:*", "matchCriteriaId": "962C2455-18A5-458C-9FC1-C10497D3E01A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:x14j_eu:-:*:*:*:*:*:*:*", "matchCriteriaId": "83ACB60E-D178-46EE-B815-D2844CBF1B7E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:x14j_firmware:t-ms14jdcncb-1004.2:*:*:*:*:*:*:*", "matchCriteriaId": "00708C81-4B19-484F-A2B6-5EC2A86DBC03", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:x14j_cn:-:*:*:*:*:*:*:*", "matchCriteriaId": "17D7C0A4-EDBE-4E41-ABF6-B330CA270446", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:x14h_firmware:t-mst14akucb-1100.4:*:*:*:*:*:*:*", "matchCriteriaId": "B87BF6CC-722B-4BCE-974F-7ECA2BDB9966", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:x14h_us:-:*:*:*:*:*:*:*", "matchCriteriaId": "988F86CD-C309-49AE-AA5D-93B279DE1C3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:x14h_firmware:t-mst14deucb-1023.0:*:*:*:*:*:*:*", "matchCriteriaId": "55CA3DE7-BF5B-4B3D-B609-DB0BCF7D5657", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:x14h_eu:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A03FF6A-9253-4DF9-9D40-074D6FF938DB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:x12_firmware:t-mst12deucb-1111.4:*:*:*:*:*:*:*", "matchCriteriaId": "E908B27E-3185-494D-972E-FF01C952DA34", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:x12_eu:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4D6792B-ACAC-4346-9BED-3CA81112B960", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:x10p_firmware:t-mst10pauscp-1302.0:*:*:*:*:*:*:*", "matchCriteriaId": "25978430-E8E0-4FB7-96A2-41AED54DB157", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:x10p_us:-:*:*:*:*:*:*:*", "matchCriteriaId": "72710637-8D8C-4112-91B4-7665F64DD2D3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:x10p_firmware:t-mst10pdeucb-1210.0:*:*:*:*:*:*:*", "matchCriteriaId": "5E21AFBC-C6B2-445C-935C-28CB3D811E44", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:x10p_eu:-:*:*:*:*:*:*:*", "matchCriteriaId": "369A7381-7F8E-49D6-99A2-3974BCAF30F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:m288ofw_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1F700FEA-2BA4-48EB-9A26-22668908B8F3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:samsung:m288ofw:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C066454-325C-438D-B283-9BE5ECFC5088", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Soft Access Point (AP) feature in Samsung Smart TVs X10P, X12, X14H, X14J, and NT14U and Xpress M288OFW printers generate weak WPA2 PSK keys, which makes it easier for remote attackers to obtain sensitive information or bypass authentication via a brute-force attack." }, { "lang": "es", "value": "La caracter\u00edstica Soft Access Point (AP) en Samsung Smart TV X10P, X12, X14H, X14J y NT14U e impresoras Xpress M288OFW genera claves WPA2 PSK d\u00e9biles, lo que hace m\u00e1s f\u00e1cil para atacantes remotos obtener informaci\u00f3n sensible o eludir la autenticaci\u00f3n a trav\u00e9s de un ataque de fuerza bruta." } ], "id": "CVE-2015-5729", "lastModified": "2024-11-21T02:33:43.527", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-03-23T20:59:00.390", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Technical Description", "Third Party Advisory" ], "url": "http://kaoticoneutral.blogspot.com.ar/2015/12/samsung-smarttv-and-printers-weak.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/134976/Samsung-SoftAP-Weak-Password.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://seclists.org/fulldisclosure/2015/Dec/79" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/79675" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1034503" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1034504" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Technical Description", "Third Party Advisory" ], "url": "http://kaoticoneutral.blogspot.com.ar/2015/12/samsung-smarttv-and-printers-weak.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/134976/Samsung-SoftAP-Weak-Password.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://seclists.org/fulldisclosure/2015/Dec/79" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/79675" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1034503" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1034504" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2015-5729
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://packetstormsecurity.com/files/134976/Samsung-SoftAP-Weak-Password.html | x_refsource_MISC | |
http://www.securitytracker.com/id/1034503 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/79675 | vdb-entry, x_refsource_BID | |
http://seclists.org/fulldisclosure/2015/Dec/79 | mailing-list, x_refsource_FULLDISC | |
http://kaoticoneutral.blogspot.com.ar/2015/12/samsung-smarttv-and-printers-weak.html | x_refsource_MISC | |
http://www.securitytracker.com/id/1034504 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T06:59:04.053Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/134976/Samsung-SoftAP-Weak-Password.html" }, { "name": "1034503", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1034503" }, { "name": "79675", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/79675" }, { "name": "20151218 Samsung softap weak random generated password", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2015/Dec/79" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://kaoticoneutral.blogspot.com.ar/2015/12/samsung-smarttv-and-printers-weak.html" }, { "name": "1034504", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1034504" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-12-17T00:00:00", "descriptions": [ { "lang": "en", "value": "The Soft Access Point (AP) feature in Samsung Smart TVs X10P, X12, X14H, X14J, and NT14U and Xpress M288OFW printers generate weak WPA2 PSK keys, which makes it easier for remote attackers to obtain sensitive information or bypass authentication via a brute-force attack." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-03-23T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/134976/Samsung-SoftAP-Weak-Password.html" }, { "name": "1034503", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1034503" }, { "name": "79675", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/79675" }, { "name": "20151218 Samsung softap weak random generated password", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2015/Dec/79" }, { "tags": [ "x_refsource_MISC" ], "url": "http://kaoticoneutral.blogspot.com.ar/2015/12/samsung-smarttv-and-printers-weak.html" }, { "name": "1034504", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1034504" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-5729", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Soft Access Point (AP) feature in Samsung Smart TVs X10P, X12, X14H, X14J, and NT14U and Xpress M288OFW printers generate weak WPA2 PSK keys, which makes it easier for remote attackers to obtain sensitive information or bypass authentication via a brute-force attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://packetstormsecurity.com/files/134976/Samsung-SoftAP-Weak-Password.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/134976/Samsung-SoftAP-Weak-Password.html" }, { "name": "1034503", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1034503" }, { "name": "79675", "refsource": "BID", "url": "http://www.securityfocus.com/bid/79675" }, { "name": "20151218 Samsung softap weak random generated password", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2015/Dec/79" }, { "name": "http://kaoticoneutral.blogspot.com.ar/2015/12/samsung-smarttv-and-printers-weak.html", "refsource": "MISC", "url": "http://kaoticoneutral.blogspot.com.ar/2015/12/samsung-smarttv-and-printers-weak.html" }, { "name": "1034504", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1034504" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-5729", "datePublished": "2017-03-23T20:00:00", "dateReserved": "2015-08-04T00:00:00", "dateUpdated": "2024-08-06T06:59:04.053Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
var-201703-0266
Vulnerability from variot
The Soft Access Point (AP) feature in Samsung Smart TVs X10P, X12, X14H, X14J, and NT14U and Xpress M288OFW printers generate weak WPA2 PSK keys, which makes it easier for remote attackers to obtain sensitive information or bypass authentication via a brute-force attack. Samsung SmartTV and Printers are prone to a security vulnerability that may allow attackers to obtain sensitive information. Attackers can exploit this issue with brute-force techniques to obtain passwords that can aid in further attacks. Samsung Smart TVs X10P, etc. are all smart TVs of South Korea's Samsung (Samsung) that integrate network content, Apps applications, AllShare content, search functions, and traditional TV channel lists into one user interface. Soft Access Point (AP) is one of the wireless access functions. There are security vulnerabilities in the Soft AP function of several Samsung products. The following products are affected: Samsung Smart TVs X10P, X12, X14H, X14J, NT14U, Xpress M288OFW. ================================================================ Samsung softap weak random generated password (This affects SmartTV and Printers) ================================================================
Information
Vulnerability Type : Weak password Vulnerable Version : many Severity: Medium Author – Augusto Pereyra CVE-ID: CVE-2015-5729 (waiting) Twitter: @aedpereyra
Description
Samsung SoftAP WPA2-PSK weak password randomly generated. It’s possible intersept wpa2-psk handshake and crack the password using aircrack in a few hours
Detailed description
http://kaoticoneutral.blogspot.com.ar/2015/12/samsung-smarttv-and-printers-weak.html
Severity Level:
Medium
Description:
Vulnerable Product:
[+] Samsung Smartvs with wifi included (Some of this firmware could be in process) Model Firmware patched X10P EU T-MST10PDEUCB-1210.0 X10P US T-MST10PAUSCB-1300.0 X10P US T-MST10PAUSCP-1302.0 X10P IBR T-MST10PIBRCB-1104.0 X12 EU T-MST12DEUCB-1111.4 X12 US T-MST12AKUCB-1114.0 X14H EU T-MST14DEUCB-1023.0 X14H US T-MST14AKUCB-1100.4 X14H CN T-MST14DCNCB-1010.0 X14J CN T-MS14JDCNCB-1004.2 X14J US T-MS14JAKUCB - 1102.5 X14J EU T-MS14JDEUCB-1018.0 NT14U EU T-NT14UDEUCB-1007.1 NT14U US T-NT14UAKUCB-1008.0 NT14U CN T-NT14UDCNCB-1003.1
[+] May be all printers Xpress series. Confirmed in M288OFW
Vulnerable Parameter(s):
[+] WPA2 password
Advisory Timeline
20-Jul-2015- Reported 27-Jul-2015- Vendor Response 02-Dec-2015- Vendor Fixed some models 17-Dec-2015- Public disclosed
Fixed Version:
All version could be fixed if you read the workaround described in "Detailed Description"
Reference
https://samsungtvbounty.com/HallofFame.aspx
http://kaoticoneutral.blogspot.com.ar/2015/12/samsung-smarttv-and-printers-weak.html
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201703-0266", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "m288ofw", "scope": "eq", "trust": 1.6, "vendor": "samsung", "version": null }, { "model": "x10p", "scope": "eq", "trust": 1.6, "vendor": "samsung", "version": "t-mst10pdeucb-1210.0" }, { "model": "x14j", "scope": "eq", "trust": 1.6, "vendor": "samsung", "version": "t-ms14jdcncb-1004.2" }, { "model": "x10p", "scope": "eq", "trust": 1.6, "vendor": "samsung", "version": "t-mst10pauscp-1302.0" }, { "model": "x14h", "scope": "eq", "trust": 1.6, "vendor": "samsung", "version": "t-mst14deucb-1023.0" }, { "model": "x10p", "scope": "eq", "trust": 1.6, "vendor": "samsung", "version": "t-mst10pibrcb-1104.0" }, { "model": "nt14u", "scope": "eq", "trust": 1.6, "vendor": "samsung", "version": "t-nt14udeucb-1007.1" }, { "model": "x14h", "scope": "eq", "trust": 1.6, "vendor": "samsung", "version": "t-mst14akucb-1100.4" }, { "model": "x14j", "scope": "eq", "trust": 1.6, "vendor": "samsung", "version": "t-ms14jdeucb-1018.0" }, { "model": "x12", "scope": "eq", "trust": 1.6, "vendor": "samsung", "version": "t-mst12deucb-1111.4" }, { "model": "xpress series printer m288ofw", "scope": null, "trust": 1.1, "vendor": "samsung", "version": null }, { "model": "x12", "scope": "eq", "trust": 1.0, "vendor": "samsung", "version": "t-mst12akucb-1114.0" }, { "model": "nt14u", "scope": "eq", "trust": 1.0, "vendor": "samsung", "version": "t-nt14uakucb-1008.0" }, { "model": "x14h", "scope": "eq", "trust": 1.0, "vendor": "samsung", "version": "t-mst14dcncb-1010.0" }, { "model": "nt14u", "scope": "eq", "trust": 1.0, "vendor": "samsung", "version": "t-nt14udcncb-1003.1" }, { "model": "x14j", "scope": "eq", "trust": 1.0, "vendor": "samsung", "version": "t-ms14jakucb-1102.5" }, { "model": "smart tv nt14u", "scope": null, "trust": 0.8, "vendor": "samsung", "version": null }, { "model": "smart tv x10p", "scope": null, "trust": 0.8, "vendor": "samsung", "version": null }, { "model": "smart tv x12", "scope": null, "trust": 0.8, "vendor": "samsung", "version": null }, { "model": "smart tv x14h", "scope": null, "trust": 0.8, "vendor": "samsung", "version": null }, { "model": "smart tv x14j", "scope": null, "trust": 0.8, "vendor": "samsung", "version": null }, { "model": "smarttv", "scope": "eq", "trust": 0.3, "vendor": "samsung", "version": "0" } ], "sources": [ { "db": "BID", "id": "79675" }, { "db": "JVNDB", "id": "JVNDB-2015-007452" }, { "db": "NVD", "id": "CVE-2015-5729" }, { "db": "CNNVD", "id": "CNNVD-201512-591" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:samsung:nt14u_firmware:t-nt14uakucb-1008.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:samsung:nt14u_us:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:samsung:x14j_firmware:t-ms14jakucb-1102.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:samsung:x14j_us:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:samsung:x14h_firmware:t-mst14dcncb-1010.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:samsung:x14h_cn:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:samsung:x12_firmware:t-mst12akucb-1114.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:samsung:x12_us:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:samsung:x10p_firmware:t-mst10pibrcb-1104.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:samsung:x10p_ibr:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:samsung:nt14u_firmware:t-nt14udeucb-1007.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:samsung:nt14u_eu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:samsung:nt14u_firmware:t-nt14udcncb-1003.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:samsung:nt14u_cn:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:samsung:x14j_firmware:t-ms14jdeucb-1018.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:samsung:x14j_eu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:samsung:x14j_firmware:t-ms14jdcncb-1004.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:samsung:x14j_cn:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:samsung:x14h_firmware:t-mst14akucb-1100.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:samsung:x14h_us:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:samsung:x14h_firmware:t-mst14deucb-1023.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:samsung:x14h_eu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:samsung:x12_firmware:t-mst12deucb-1111.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:samsung:x12_eu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:samsung:x10p_firmware:t-mst10pauscp-1302.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:samsung:x10p_us:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:samsung:x10p_firmware:t-mst10pdeucb-1210.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:samsung:x10p_eu:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:samsung:m288ofw_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:samsung:m288ofw:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2015-5729" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Augusto Pereyra", "sources": [ { "db": "BID", "id": "79675" }, { "db": "PACKETSTORM", "id": "134976" }, { "db": "CNNVD", "id": "CNNVD-201512-591" } ], "trust": 1.0 }, "cve": "CVE-2015-5729", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2015-5729", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-83690", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2015-5729", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2015-5729", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-201512-591", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-83690", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-83690" }, { "db": "JVNDB", "id": "JVNDB-2015-007452" }, { "db": "NVD", "id": "CVE-2015-5729" }, { "db": "CNNVD", "id": "CNNVD-201512-591" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Soft Access Point (AP) feature in Samsung Smart TVs X10P, X12, X14H, X14J, and NT14U and Xpress M288OFW printers generate weak WPA2 PSK keys, which makes it easier for remote attackers to obtain sensitive information or bypass authentication via a brute-force attack. Samsung SmartTV and Printers are prone to a security vulnerability that may allow attackers to obtain sensitive information. \nAttackers can exploit this issue with brute-force techniques to obtain passwords that can aid in further attacks. Samsung Smart TVs X10P, etc. are all smart TVs of South Korea\u0027s Samsung (Samsung) that integrate network content, Apps applications, AllShare content, search functions, and traditional TV channel lists into one user interface. Soft Access Point (AP) is one of the wireless access functions. There are security vulnerabilities in the Soft AP function of several Samsung products. The following products are affected: Samsung Smart TVs X10P, X12, X14H, X14J, NT14U, Xpress M288OFW. ================================================================\nSamsung softap weak random generated password (This affects SmartTV and\nPrinters)\n================================================================\n\nInformation\n**********************\n\nVulnerability Type : Weak password\nVulnerable Version : many\nSeverity: Medium\nAuthor \u2013 Augusto Pereyra\nCVE-ID: CVE-2015-5729 (waiting)\nTwitter: @aedpereyra\n\nDescription\n***********************\n\nSamsung SoftAP WPA2-PSK weak password randomly generated. It\u2019s possible\nintersept wpa2-psk handshake and crack the password using aircrack in a few\nhours\n\nDetailed description\n**************************\nhttp://kaoticoneutral.blogspot.com.ar/2015/12/samsung-smarttv-and-printers-weak.html\n\nSeverity Level:\n=========================================================\nMedium\n\nDescription:\n==========================================================\n\nVulnerable Product:\n\n[+] Samsung Smartvs with wifi included (Some of this firmware could be in\nprocess)\nModel Firmware patched\nX10P EU T-MST10PDEUCB-1210.0\nX10P US\nT-MST10PAUSCB-1300.0\nX10P US T-MST10PAUSCP-1302.0\nX10P IBR T-MST10PIBRCB-1104.0\nX12 EU T-MST12DEUCB-1111.4\nX12 US T-MST12AKUCB-1114.0\nX14H EU T-MST14DEUCB-1023.0\nX14H US T-MST14AKUCB-1100.4\nX14H CN T-MST14DCNCB-1010.0\nX14J CN T-MS14JDCNCB-1004.2\nX14J US T-MS14JAKUCB - 1102.5\nX14J EU T-MS14JDEUCB-1018.0\nNT14U EU T-NT14UDEUCB-1007.1\nNT14U US T-NT14UAKUCB-1008.0\nNT14U CN T-NT14UDCNCB-1003.1\n\n[+] May be all printers Xpress series. Confirmed in M288OFW\n\nVulnerable Parameter(s):\n\n[+] WPA2 password\n\nAdvisory Timeline\n************************\n\n20-Jul-2015- Reported\n27-Jul-2015- Vendor Response\n02-Dec-2015- Vendor Fixed some models\n17-Dec-2015- Public disclosed\n\nFixed Version:\n*****************\n\nAll version could be fixed if you read the workaround described in\n\"Detailed Description\"\n\nReference\n*****************\n\nhttps://samsungtvbounty.com/HallofFame.aspx\n\nhttp://kaoticoneutral.blogspot.com.ar/2015/12/samsung-smarttv-and-printers-weak.html\n", "sources": [ { "db": "NVD", "id": "CVE-2015-5729" }, { "db": "JVNDB", "id": "JVNDB-2015-007452" }, { "db": "BID", "id": "79675" }, { "db": "VULHUB", "id": "VHN-83690" }, { "db": "PACKETSTORM", "id": "134976" } ], "trust": 2.07 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-83690", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-83690" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-5729", "trust": 2.9 }, { "db": "PACKETSTORM", "id": "134976", "trust": 2.6 }, { "db": "BID", "id": "79675", "trust": 2.0 }, { "db": "SECTRACK", "id": "1034504", "trust": 1.7 }, { "db": "SECTRACK", "id": "1034503", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2015-007452", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201512-591", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-83690", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-83690" }, { "db": "BID", "id": "79675" }, { "db": "JVNDB", "id": "JVNDB-2015-007452" }, { "db": "PACKETSTORM", "id": "134976" }, { "db": "NVD", "id": "CVE-2015-5729" }, { "db": "CNNVD", "id": "CNNVD-201512-591" } ] }, "id": "VAR-201703-0266", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-83690" } ], "trust": 0.85 }, "last_update_date": "2023-12-18T13:19:36.422000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "\u30c8\u30c3\u30d7\u30da\u30fc\u30b8", "trust": 0.8, "url": "http://www.galaxymobile.jp/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-007452" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-200", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-83690" }, { "db": "JVNDB", "id": "JVNDB-2015-007452" }, { "db": "NVD", "id": "CVE-2015-5729" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://packetstormsecurity.com/files/134976/samsung-softap-weak-password.html" }, { "trust": 2.1, "url": "http://kaoticoneutral.blogspot.com.ar/2015/12/samsung-smarttv-and-printers-weak.html" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/79675" }, { "trust": 1.7, "url": "http://seclists.org/fulldisclosure/2015/dec/79" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id/1034503" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id/1034504" }, { "trust": 0.9, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-5729" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-5729" }, { "trust": 0.8, "url": "http://kaoticoneutral.blogspot.jp/2015/12/samsung-smarttv-and-printers-weak.html" }, { "trust": 0.3, "url": "http://www.samsung.com/" }, { "trust": 0.1, "url": "https://samsungtvbounty.com/halloffame.aspx" } ], "sources": [ { "db": "VULHUB", "id": "VHN-83690" }, { "db": "BID", "id": "79675" }, { "db": "JVNDB", "id": "JVNDB-2015-007452" }, { "db": "PACKETSTORM", "id": "134976" }, { "db": "NVD", "id": "CVE-2015-5729" }, { "db": "CNNVD", "id": "CNNVD-201512-591" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-83690" }, { "db": "BID", "id": "79675" }, { "db": "JVNDB", "id": "JVNDB-2015-007452" }, { "db": "PACKETSTORM", "id": "134976" }, { "db": "NVD", "id": "CVE-2015-5729" }, { "db": "CNNVD", "id": "CNNVD-201512-591" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-03-23T00:00:00", "db": "VULHUB", "id": "VHN-83690" }, { "date": "2015-12-17T00:00:00", "db": "BID", "id": "79675" }, { "date": "2017-05-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-007452" }, { "date": "2015-12-18T21:10:57", "db": "PACKETSTORM", "id": "134976" }, { "date": "2017-03-23T20:59:00.390000", "db": "NVD", "id": "CVE-2015-5729" }, { "date": "2015-12-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201512-591" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-04-04T00:00:00", "db": "VULHUB", "id": "VHN-83690" }, { "date": "2015-12-17T00:00:00", "db": "BID", "id": "79675" }, { "date": "2017-05-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-007452" }, { "date": "2017-04-04T16:15:13.807000", "db": "NVD", "id": "CVE-2015-5729" }, { "date": "2017-03-24T00:00:00", "db": "CNNVD", "id": "CNNVD-201512-591" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201512-591" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Samsung Smart TV and Xpress of Soft Access Point Vulnerabilities that capture important information on functions", "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-007452" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-201512-591" } ], "trust": 0.6 } }