CVE-2018-14825 (GCVE-0-2018-14825)
Vulnerability from cvelistv5 – Published: 2018-09-24 20:00 – Updated: 2024-09-17 01:26
VLAI?
Summary
On Honeywell Mobile Computers (CT60 running Android OS 7.1, CN80 running Android OS 7.1, CT40 running Android OS 7.1, CK75 running Android OS 6.0, CN75 running Android OS 6.0, CN75e running Android OS 6.0, CT50 running Android OS 6.0, D75e running Android OS 6.0, CT50 running Android OS 4.4, D75e running Android OS 4.4, CN51 running Android OS 6.0, EDA50k running Android 4.4, EDA50 running Android OS 7.1, EDA50k running Android OS 7.1, EDA70 running Android OS 7.1, EDA60k running Android OS 7.1, and EDA51 running Android OS 8.1), a skilled attacker with advanced knowledge of the target system could exploit this vulnerability by creating an application that would successfully bind to the service and gain elevated system privileges. This could enable the attacker to obtain access to keystrokes, passwords, personal identifiable information, photos, emails, or business-critical documents.
Severity ?
No CVSS data available.
CWE
- CWE-269 - IMPROPER PRIVILEGE MANAGEMENT CWE-269
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Honeywell | Mobile Computers |
Affected:
CT60 running Android OS 7.1
Affected: CN80 running Android OS 7.1 Affected: CT40 running Android OS 7.1 Affected: CK75 running Android OS 6.0 Affected: CN75 running Android OS 6.0 Affected: CN75e running Android OS 6.0 Affected: CT50 running Android OS 6.0 Affected: D75e running Android OS 6.0 Affected: CT50 running Android OS 4.4 Affected: D75e running Android OS 4.4 Affected: CN51 running Android OS 6.0 Affected: EDA50k running Android 4.4 Affected: EDA50 running Android OS 7.1 Affected: EDA50k running Android OS 7.1 Affected: EDA70 running Android OS 7.1 Affected: EDA60k running Android OS 7.1 Affected: EDA51 running Android OS 8.1 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T09:38:13.990Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://cert.vde.com/de-de/advisories/vde-2018-016"
},
{
"name": "105767",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/105767"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-256-01"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Mobile Computers",
"vendor": "Honeywell",
"versions": [
{
"status": "affected",
"version": "CT60 running Android OS 7.1"
},
{
"status": "affected",
"version": "CN80 running Android OS 7.1"
},
{
"status": "affected",
"version": "CT40 running Android OS 7.1"
},
{
"status": "affected",
"version": "CK75 running Android OS 6.0"
},
{
"status": "affected",
"version": "CN75 running Android OS 6.0"
},
{
"status": "affected",
"version": "CN75e running Android OS 6.0"
},
{
"status": "affected",
"version": "CT50 running Android OS 6.0"
},
{
"status": "affected",
"version": "D75e running Android OS 6.0"
},
{
"status": "affected",
"version": "CT50 running Android OS 4.4"
},
{
"status": "affected",
"version": "D75e running Android OS 4.4"
},
{
"status": "affected",
"version": "CN51 running Android OS 6.0"
},
{
"status": "affected",
"version": "EDA50k running Android 4.4"
},
{
"status": "affected",
"version": "EDA50 running Android OS 7.1"
},
{
"status": "affected",
"version": "EDA50k running Android OS 7.1"
},
{
"status": "affected",
"version": "EDA70 running Android OS 7.1"
},
{
"status": "affected",
"version": "EDA60k running Android OS 7.1"
},
{
"status": "affected",
"version": "EDA51 running Android OS 8.1"
}
]
}
],
"datePublic": "2018-09-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "On Honeywell Mobile Computers (CT60 running Android OS 7.1, CN80 running Android OS 7.1, CT40 running Android OS 7.1, CK75 running Android OS 6.0, CN75 running Android OS 6.0, CN75e running Android OS 6.0, CT50 running Android OS 6.0, D75e running Android OS 6.0, CT50 running Android OS 4.4, D75e running Android OS 4.4, CN51 running Android OS 6.0, EDA50k running Android 4.4, EDA50 running Android OS 7.1, EDA50k running Android OS 7.1, EDA70 running Android OS 7.1, EDA60k running Android OS 7.1, and EDA51 running Android OS 8.1), a skilled attacker with advanced knowledge of the target system could exploit this vulnerability by creating an application that would successfully bind to the service and gain elevated system privileges. This could enable the attacker to obtain access to keystrokes, passwords, personal identifiable information, photos, emails, or business-critical documents."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-269",
"description": "IMPROPER PRIVILEGE MANAGEMENT CWE-269",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-11-01T09:57:01",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://cert.vde.com/de-de/advisories/vde-2018-016"
},
{
"name": "105767",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/105767"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-256-01"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"DATE_PUBLIC": "2018-09-13T00:00:00",
"ID": "CVE-2018-14825",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Mobile Computers",
"version": {
"version_data": [
{
"version_value": "CT60 running Android OS 7.1"
},
{
"version_value": "CN80 running Android OS 7.1"
},
{
"version_value": "CT40 running Android OS 7.1"
},
{
"version_value": "CK75 running Android OS 6.0"
},
{
"version_value": "CN75 running Android OS 6.0"
},
{
"version_value": "CN75e running Android OS 6.0"
},
{
"version_value": "CT50 running Android OS 6.0"
},
{
"version_value": "D75e running Android OS 6.0"
},
{
"version_value": "CT50 running Android OS 4.4"
},
{
"version_value": "D75e running Android OS 4.4"
},
{
"version_value": "CN51 running Android OS 6.0"
},
{
"version_value": "EDA50k running Android 4.4"
},
{
"version_value": "EDA50 running Android OS 7.1"
},
{
"version_value": "EDA50k running Android OS 7.1"
},
{
"version_value": "EDA70 running Android OS 7.1"
},
{
"version_value": "EDA60k running Android OS 7.1"
},
{
"version_value": "EDA51 running Android OS 8.1"
}
]
}
}
]
},
"vendor_name": "Honeywell"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "On Honeywell Mobile Computers (CT60 running Android OS 7.1, CN80 running Android OS 7.1, CT40 running Android OS 7.1, CK75 running Android OS 6.0, CN75 running Android OS 6.0, CN75e running Android OS 6.0, CT50 running Android OS 6.0, D75e running Android OS 6.0, CT50 running Android OS 4.4, D75e running Android OS 4.4, CN51 running Android OS 6.0, EDA50k running Android 4.4, EDA50 running Android OS 7.1, EDA50k running Android OS 7.1, EDA70 running Android OS 7.1, EDA60k running Android OS 7.1, and EDA51 running Android OS 8.1), a skilled attacker with advanced knowledge of the target system could exploit this vulnerability by creating an application that would successfully bind to the service and gain elevated system privileges. This could enable the attacker to obtain access to keystrokes, passwords, personal identifiable information, photos, emails, or business-critical documents."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "IMPROPER PRIVILEGE MANAGEMENT CWE-269"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://cert.vde.com/de-de/advisories/vde-2018-016",
"refsource": "MISC",
"url": "https://cert.vde.com/de-de/advisories/vde-2018-016"
},
{
"name": "105767",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/105767"
},
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-256-01",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-256-01"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2018-14825",
"datePublished": "2018-09-24T20:00:00Z",
"dateReserved": "2018-08-01T00:00:00",
"dateUpdated": "2024-09-17T01:26:43.460Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:honeywell:cn80:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D1D869B3-0F99-4B0B-8D45-A2CC49FD34B8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:honeywell:ct40:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"41E581B1-2DF5-4976-A98D-86410DC093FE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:honeywell:ct60:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F2DFDCE6-48B4-43B2-8A4C-EBBD009F1D35\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:honeywell:eda50:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EF7F4ED7-2E7A-469A-AF94-1D777BC524BB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:honeywell:eda50k:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2F6DCB47-E75C-4493-AEFC-AA85CF6D1911\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:honeywell:eda60k:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"16F1DC1D-8A7C-49FC-BC3F-9E8E8C6E76EB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:honeywell:eda70:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9D21E5A7-4167-4DD2-B3D4-8911EBCA6168\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:google:android:7.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FC30B2A2-9674-4052-B402-20348E50F9E8\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:honeywell:ck75:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"69EF9A2F-B102-4115-85A3-EE5C21C0169B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:honeywell:cn51:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"72A6CB80-88B2-4DEB-8912-236C6FABF90B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:honeywell:cn75:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C6BBD6E9-0540-4263-BA52-019E5BB51ABA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:honeywell:cn75e:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AD4A2025-004B-448C-87E1-B432C77AE2E4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:honeywell:d75e:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4FD442EE-7AC6-4D4C-8862-5CA6F731DBC7\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E70C6D8D-C9C3-4D92-8DFC-71F59E068295\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:honeywell:ct50:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C29434F4-0DB7-4CDD-A37E-54CB227B4C39\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:honeywell:d75e:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4FD442EE-7AC6-4D4C-8862-5CA6F731DBC7\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"98C32982-095C-4628-9958-118A3D3A9CAA\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E70C6D8D-C9C3-4D92-8DFC-71F59E068295\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:honeywell:eda50k:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2F6DCB47-E75C-4493-AEFC-AA85CF6D1911\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"98C32982-095C-4628-9958-118A3D3A9CAA\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:honeywell:eda51:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B51B9958-2621-4403-B59C-703538E8321E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B06BE74B-83F4-41A3-8AD3-2E6248F7B0B2\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"On Honeywell Mobile Computers (CT60 running Android OS 7.1, CN80 running Android OS 7.1, CT40 running Android OS 7.1, CK75 running Android OS 6.0, CN75 running Android OS 6.0, CN75e running Android OS 6.0, CT50 running Android OS 6.0, D75e running Android OS 6.0, CT50 running Android OS 4.4, D75e running Android OS 4.4, CN51 running Android OS 6.0, EDA50k running Android 4.4, EDA50 running Android OS 7.1, EDA50k running Android OS 7.1, EDA70 running Android OS 7.1, EDA60k running Android OS 7.1, and EDA51 running Android OS 8.1), a skilled attacker with advanced knowledge of the target system could exploit this vulnerability by creating an application that would successfully bind to the service and gain elevated system privileges. This could enable the attacker to obtain access to keystrokes, passwords, personal identifiable information, photos, emails, or business-critical documents.\"}, {\"lang\": \"es\", \"value\": \"En Honeywell Mobile Computers (CT60 con Android OS 7.1, CN80 con Android OS 7.1, CT40 con Android OS 7.1, CK75 con Android OS 6.0, CN75 con Android OS 6.0, CN75e con Android OS 6.0, CT50 con Android OS 6.0, D75e con Android OS 6.0, CT50 con Android OS 4.4, D75e con Android OS 4.4, CN51 con Android OS 6.0, EDA50k con Android 4.4, EDA50 con Android OS 7.1, EDA50k con Android OS 7.1, EDA70 con Android OS 7.1, EDA60k con Android OS 7.1 y EDA51 con Android OS 8.1), un atacante habilidoso con conocimientos avanzados del sistema objetivo podr\\u00eda explotar esta vulnerabilidad creando una aplicaci\\u00f3n que se enlazar\\u00eda exitosamente al servicio y obtendr\\u00eda privilegios elevados en el sistema. Esto podr\\u00eda permitir que el atacante obtenga acceso a las pulsaciones de teclas, contrase\\u00f1as, informaci\\u00f3n personal identificable, fotograf\\u00edas, emails o documentos cr\\u00edticos para una empresa.\"}]",
"id": "CVE-2018-14825",
"lastModified": "2024-11-21T03:49:52.587",
"metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H\", \"baseScore\": 5.8, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.0, \"impactScore\": 4.7}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:P/A:P\", \"baseScore\": 6.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
"published": "2018-09-24T19:29:00.507",
"references": "[{\"url\": \"http://www.securityfocus.com/bid/105767\", \"source\": \"ics-cert@hq.dhs.gov\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://cert.vde.com/de-de/advisories/vde-2018-016\", \"source\": \"ics-cert@hq.dhs.gov\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://ics-cert.us-cert.gov/advisories/ICSA-18-256-01\", \"source\": \"ics-cert@hq.dhs.gov\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"http://www.securityfocus.com/bid/105767\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://cert.vde.com/de-de/advisories/vde-2018-016\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://ics-cert.us-cert.gov/advisories/ICSA-18-256-01\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}]",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"ics-cert@hq.dhs.gov\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-269\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-732\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2018-14825\",\"sourceIdentifier\":\"ics-cert@hq.dhs.gov\",\"published\":\"2018-09-24T19:29:00.507\",\"lastModified\":\"2024-11-21T03:49:52.587\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"On Honeywell Mobile Computers (CT60 running Android OS 7.1, CN80 running Android OS 7.1, CT40 running Android OS 7.1, CK75 running Android OS 6.0, CN75 running Android OS 6.0, CN75e running Android OS 6.0, CT50 running Android OS 6.0, D75e running Android OS 6.0, CT50 running Android OS 4.4, D75e running Android OS 4.4, CN51 running Android OS 6.0, EDA50k running Android 4.4, EDA50 running Android OS 7.1, EDA50k running Android OS 7.1, EDA70 running Android OS 7.1, EDA60k running Android OS 7.1, and EDA51 running Android OS 8.1), a skilled attacker with advanced knowledge of the target system could exploit this vulnerability by creating an application that would successfully bind to the service and gain elevated system privileges. This could enable the attacker to obtain access to keystrokes, passwords, personal identifiable information, photos, emails, or business-critical documents.\"},{\"lang\":\"es\",\"value\":\"En Honeywell Mobile Computers (CT60 con Android OS 7.1, CN80 con Android OS 7.1, CT40 con Android OS 7.1, CK75 con Android OS 6.0, CN75 con Android OS 6.0, CN75e con Android OS 6.0, CT50 con Android OS 6.0, D75e con Android OS 6.0, CT50 con Android OS 4.4, D75e con Android OS 4.4, CN51 con Android OS 6.0, EDA50k con Android 4.4, EDA50 con Android OS 7.1, EDA50k con Android OS 7.1, EDA70 con Android OS 7.1, EDA60k con Android OS 7.1 y EDA51 con Android OS 8.1), un atacante habilidoso con conocimientos avanzados del sistema objetivo podr\u00eda explotar esta vulnerabilidad creando una aplicaci\u00f3n que se enlazar\u00eda exitosamente al servicio y obtendr\u00eda privilegios elevados en el sistema. Esto podr\u00eda permitir que el atacante obtenga acceso a las pulsaciones de teclas, contrase\u00f1as, informaci\u00f3n personal identificable, fotograf\u00edas, emails o documentos cr\u00edticos para una empresa.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H\",\"baseScore\":5.8,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.0,\"impactScore\":4.7}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-269\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-732\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:honeywell:cn80:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1D869B3-0F99-4B0B-8D45-A2CC49FD34B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:honeywell:ct40:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41E581B1-2DF5-4976-A98D-86410DC093FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:honeywell:ct60:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2DFDCE6-48B4-43B2-8A4C-EBBD009F1D35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:honeywell:eda50:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF7F4ED7-2E7A-469A-AF94-1D777BC524BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:honeywell:eda50k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F6DCB47-E75C-4493-AEFC-AA85CF6D1911\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:honeywell:eda60k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F1DC1D-8A7C-49FC-BC3F-9E8E8C6E76EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:honeywell:eda70:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D21E5A7-4167-4DD2-B3D4-8911EBCA6168\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:7.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC30B2A2-9674-4052-B402-20348E50F9E8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:honeywell:ck75:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69EF9A2F-B102-4115-85A3-EE5C21C0169B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:honeywell:cn51:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72A6CB80-88B2-4DEB-8912-236C6FABF90B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:honeywell:cn75:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6BBD6E9-0540-4263-BA52-019E5BB51ABA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:honeywell:cn75e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD4A2025-004B-448C-87E1-B432C77AE2E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:honeywell:d75e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FD442EE-7AC6-4D4C-8862-5CA6F731DBC7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E70C6D8D-C9C3-4D92-8DFC-71F59E068295\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:honeywell:ct50:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C29434F4-0DB7-4CDD-A37E-54CB227B4C39\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:honeywell:d75e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FD442EE-7AC6-4D4C-8862-5CA6F731DBC7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98C32982-095C-4628-9958-118A3D3A9CAA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E70C6D8D-C9C3-4D92-8DFC-71F59E068295\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:honeywell:eda50k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F6DCB47-E75C-4493-AEFC-AA85CF6D1911\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98C32982-095C-4628-9958-118A3D3A9CAA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:honeywell:eda51:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B51B9958-2621-4403-B59C-703538E8321E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B06BE74B-83F4-41A3-8AD3-2E6248F7B0B2\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/105767\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://cert.vde.com/de-de/advisories/vde-2018-016\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://ics-cert.us-cert.gov/advisories/ICSA-18-256-01\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.securityfocus.com/bid/105767\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://cert.vde.com/de-de/advisories/vde-2018-016\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://ics-cert.us-cert.gov/advisories/ICSA-18-256-01\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…