CVE-2012-6334
Vulnerability from cvelistv5
Published
2012-12-31 11:00
Modified
2024-09-16 17:28
Severity ?
EPSS score ?
Summary
The Track My Mobile feature in the SamsungDive subsystem for Android on Samsung Galaxy devices does not properly implement Location APIs, which allows physically proximate attackers to provide arbitrary location data via a "commonly available simple GPS location spoofer."
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:28:39.416Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://thehackernews.com/2012/12/manufacture-based-gps-tracking-services.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The Track My Mobile feature in the SamsungDive subsystem for Android on Samsung Galaxy devices does not properly implement Location APIs, which allows physically proximate attackers to provide arbitrary location data via a \"commonly available simple GPS location spoofer.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-12-31T11:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://thehackernews.com/2012/12/manufacture-based-gps-tracking-services.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-6334", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Track My Mobile feature in the SamsungDive subsystem for Android on Samsung Galaxy devices does not properly implement Location APIs, which allows physically proximate attackers to provide arbitrary location data via a \"commonly available simple GPS location spoofer.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://thehackernews.com/2012/12/manufacture-based-gps-tracking-services.html", "refsource": "MISC", "url": "http://thehackernews.com/2012/12/manufacture-based-gps-tracking-services.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-6334", "datePublished": "2012-12-31T11:00:00Z", "dateReserved": "2012-12-13T00:00:00Z", "dateUpdated": "2024-09-16T17:28:53.097Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:samsung:samsungdive:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1A2FC077-4D6C-4342-9B7F-FE2AC47F736A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:samsung:galaxy_note_2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C11A19CD-FAFE-45ED-A24C-72642C3ED565\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:samsung:galaxy_s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A60CAD7B-6A6C-4627-B999-AA442F210486\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:samsung:galaxy_s2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"27B05798-6E5E-4DCD-810E-680DEB3BDE97\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"The Track My Mobile feature in the SamsungDive subsystem for Android on Samsung Galaxy devices does not properly implement Location APIs, which allows physically proximate attackers to provide arbitrary location data via a \\\"commonly available simple GPS location spoofer.\\\"\"}, {\"lang\": \"es\", \"value\": \"La funci\\u00f3n \\\"Track My Mobile\\\" en el subsistema SamsungDive para Android en los dispositivos Samsung Galaxy no implementa correctamente las APIs de localizaci\\u00f3n, lo que permite a atacantes f\\u00edsicamente pr\\u00f3ximos proporcionar datos de localizaci\\u00f3n de su elecci\\u00f3n a trav\\u00e9s de un \\\"sencillo spoofer de localizaci\\u00f3n GPS com\\u00fanmente disponible.\\\"\\r\\n\"}]", "id": "CVE-2012-6334", "lastModified": "2024-11-21T01:46:01.567", "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:A/AC:M/Au:N/C:N/I:P/A:N\", \"baseScore\": 2.9, \"accessVector\": \"ADJACENT_NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"LOW\", \"exploitabilityScore\": 5.5, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2012-12-31T11:50:28.047", "references": "[{\"url\": \"http://thehackernews.com/2012/12/manufacture-based-gps-tracking-services.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://thehackernews.com/2012/12/manufacture-based-gps-tracking-services.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]", "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-264\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2012-6334\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2012-12-31T11:50:28.047\",\"lastModified\":\"2024-11-21T01:46:01.567\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The Track My Mobile feature in the SamsungDive subsystem for Android on Samsung Galaxy devices does not properly implement Location APIs, which allows physically proximate attackers to provide arbitrary location data via a \\\"commonly available simple GPS location spoofer.\\\"\"},{\"lang\":\"es\",\"value\":\"La funci\u00f3n \\\"Track My Mobile\\\" en el subsistema SamsungDive para Android en los dispositivos Samsung Galaxy no implementa correctamente las APIs de localizaci\u00f3n, lo que permite a atacantes f\u00edsicamente pr\u00f3ximos proporcionar datos de localizaci\u00f3n de su elecci\u00f3n a trav\u00e9s de un \\\"sencillo spoofer de localizaci\u00f3n GPS com\u00fanmente disponible.\\\"\\r\\n\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:A/AC:M/Au:N/C:N/I:P/A:N\",\"baseScore\":2.9,\"accessVector\":\"ADJACENT_NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":5.5,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-264\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:samsung:samsungdive:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A2FC077-4D6C-4342-9B7F-FE2AC47F736A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:samsung:galaxy_note_2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11A19CD-FAFE-45ED-A24C-72642C3ED565\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:samsung:galaxy_s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A60CAD7B-6A6C-4627-B999-AA442F210486\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:samsung:galaxy_s2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27B05798-6E5E-4DCD-810E-680DEB3BDE97\"}]}]}],\"references\":[{\"url\":\"http://thehackernews.com/2012/12/manufacture-based-gps-tracking-services.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://thehackernews.com/2012/12/manufacture-based-gps-tracking-services.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.