CVE-2018-11567 (GCVE-0-2018-11567)

Vulnerability from cvelistv5 – Published: 2018-05-30 22:00 – Updated: 2024-08-05 08:10 Disputed
VLAI?
Summary
Prior to 2018-04-27, the reprompt feature in Amazon Echo devices could be misused by a custom Alexa skill. The reprompt feature is designed so that if Alexa does not receive an input within 8 seconds, the device can speak a reprompt, then wait an additional 8 seconds for input; if the user still does not respond, the microphone is then turned off. The vulnerability involves empty output-speech reprompts, custom wildcard ("gibberish") input slots, and logging of detected speech. If a maliciously designed skill is installed, an attacker could obtain transcripts of speech not intended for Alexa to process, but simply spoken within the device's hearing range. NOTE: The vendor states "Customer trust is important to us and we take security and privacy seriously. We have put mitigations in place for detecting this type of skill behavior and reject or suppress those skills when we do. Customers do not need to take any action for these mitigations to work.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T08:10:14.877Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.yahoo.com/news/amazon-alexa-bug-let-hackers-104609600.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.wired.com/story/amazon-echo-alexa-skill-spying/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://info.checkmarx.com/hubfs/Amazon_Echo_Research.pdf"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.checkmarx.com/2018/04/25/eavesdropping-with-amazon-alexa/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2018-05-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Prior to 2018-04-27, the reprompt feature in Amazon Echo devices could be misused by a custom Alexa skill. The reprompt feature is designed so that if Alexa does not receive an input within 8 seconds, the device can speak a reprompt, then wait an additional 8 seconds for input; if the user still does not respond, the microphone is then turned off. The vulnerability involves empty output-speech reprompts, custom wildcard (\"gibberish\") input slots, and logging of detected speech. If a maliciously designed skill is installed, an attacker could obtain transcripts of speech not intended for Alexa to process, but simply spoken within the device\u0027s hearing range. NOTE: The vendor states \"Customer trust is important to us and we take security and privacy seriously. We have put mitigations in place for detecting this type of skill behavior and reject or suppress those skills when we do. Customers do not need to take any action for these mitigations to work."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-05-31T21:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.yahoo.com/news/amazon-alexa-bug-let-hackers-104609600.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.wired.com/story/amazon-echo-alexa-skill-spying/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://info.checkmarx.com/hubfs/Amazon_Echo_Research.pdf"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.checkmarx.com/2018/04/25/eavesdropping-with-amazon-alexa/"
        }
      ],
      "tags": [
        "disputed"
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2018-11567",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "** DISPUTED ** Prior to 2018-04-27, the reprompt feature in Amazon Echo devices could be misused by a custom Alexa skill. The reprompt feature is designed so that if Alexa does not receive an input within 8 seconds, the device can speak a reprompt, then wait an additional 8 seconds for input; if the user still does not respond, the microphone is then turned off. The vulnerability involves empty output-speech reprompts, custom wildcard (\"gibberish\") input slots, and logging of detected speech. If a maliciously designed skill is installed, an attacker could obtain transcripts of speech not intended for Alexa to process, but simply spoken within the device\u0027s hearing range. NOTE: The vendor states \"Customer trust is important to us and we take security and privacy seriously. We have put mitigations in place for detecting this type of skill behavior and reject or suppress those skills when we do. Customers do not need to take any action for these mitigations to work.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.yahoo.com/news/amazon-alexa-bug-let-hackers-104609600.html",
              "refsource": "MISC",
              "url": "https://www.yahoo.com/news/amazon-alexa-bug-let-hackers-104609600.html"
            },
            {
              "name": "https://www.wired.com/story/amazon-echo-alexa-skill-spying/",
              "refsource": "MISC",
              "url": "https://www.wired.com/story/amazon-echo-alexa-skill-spying/"
            },
            {
              "name": "https://info.checkmarx.com/hubfs/Amazon_Echo_Research.pdf",
              "refsource": "MISC",
              "url": "https://info.checkmarx.com/hubfs/Amazon_Echo_Research.pdf"
            },
            {
              "name": "https://www.checkmarx.com/2018/04/25/eavesdropping-with-amazon-alexa/",
              "refsource": "MISC",
              "url": "https://www.checkmarx.com/2018/04/25/eavesdropping-with-amazon-alexa/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2018-11567",
    "datePublished": "2018-05-30T22:00:00",
    "dateReserved": "2018-05-30T00:00:00",
    "dateUpdated": "2024-08-05T08:10:14.877Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amazon:echo_show_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2018-04-27\", \"matchCriteriaId\": \"C537E345-743C-4133-BD30-BDA8FC1D79F8\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amazon:echo_show:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B4E70A6-EEA3-406D-892D-890FADCF903B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amazon:echo_plus_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2018-04-27\", \"matchCriteriaId\": \"F068EAC5-7E06-4266-9C3A-2086D668108F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amazon:echo_plus:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4678CA25-4A03-44C8-94F6-E2EF358E11A8\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amazon:echo_dot_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2018-04-27\", \"matchCriteriaId\": \"A209937B-9600-4FEE-AFA8-1B06B544C31E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amazon:echo_dot:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AB26F1B2-337C-4C76-8A5D-0DA2A2BED079\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amazon:echo_spot_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2018-04-27\", \"matchCriteriaId\": \"86DE3646-EF47-465D-A509-59021D3C6F6A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amazon:echo_spot:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7BC230E1-57B7-4ECC-B5F0-DB4B442F32B2\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amazon:echo_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2018-04-27\", \"matchCriteriaId\": \"9B1FF2CE-455A-4258-9989-76A4E56F2D5D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amazon:echo:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E4DBAF49-9612-4981-95D1-4006D1315E2C\"}]}]}]",
      "cveTags": "[{\"sourceIdentifier\": \"cve@mitre.org\", \"tags\": [\"disputed\"]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Prior to 2018-04-27, the reprompt feature in Amazon Echo devices could be misused by a custom Alexa skill. The reprompt feature is designed so that if Alexa does not receive an input within 8 seconds, the device can speak a reprompt, then wait an additional 8 seconds for input; if the user still does not respond, the microphone is then turned off. The vulnerability involves empty output-speech reprompts, custom wildcard (\\\"gibberish\\\") input slots, and logging of detected speech. If a maliciously designed skill is installed, an attacker could obtain transcripts of speech not intended for Alexa to process, but simply spoken within the device\u0027s hearing range. NOTE: The vendor states \\\"Customer trust is important to us and we take security and privacy seriously. We have put mitigations in place for detecting this type of skill behavior and reject or suppress those skills when we do. Customers do not need to take any action for these mitigations to work.\"}, {\"lang\": \"es\", \"value\": \"** EN DISPUTA ** Antes del 27 de abril de 2018, la funci\\u00f3n reprompt en los dispositivos de Amazon Echo pod\\u00eda ser utilizada de manera incorrecta por una habilidad personalizada de Alexa. La funci\\u00f3n reprompt est\\u00e1 dise\\u00f1ada para que si Alexa no recibe una entrada en 8 segundos, el dispositivo pueda decir un \\\"reprompt\\\" y luego esperar 8 segundos adicionales por la entrada; si el usuario sigue sin responder, el micr\\u00f3fono se apaga. La vulnerabilidad incluye reprompts de voz de salida vac\\u00eda, ranuras de entrada de wildcards personalizados (\\\"gibberish\\\") y registro del habla detectada. Si se instala una habilidad maliciosamente dise\\u00f1ada, un atacante podr\\u00eda obtener transcripciones del habla no destinadas a ser procesadas por Alexa, pero que simplemente se digan dentro del rango auditivo del dispositivo. NOTA: El fabricante afirma: \\\"La confianza del cliente es importante para nosotros y nos tomamos en serio la seguridad y la privacidad. Hemos implementado mitigaciones para detectar este tipo de comportamiento de habilidades y rechazar o suprimir esas habilidades cuando lo hacemos. Los clientes no necesitan tomar ninguna acci\\u00f3n para que estas mitigaciones funcionen\\\".\"}]",
      "id": "CVE-2018-11567",
      "lastModified": "2024-11-21T03:43:37.953",
      "metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N\", \"baseScore\": 3.3, \"baseSeverity\": \"LOW\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 1.4}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:N/A:N\", \"baseScore\": 4.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
      "published": "2018-05-30T22:29:00.243",
      "references": "[{\"url\": \"https://info.checkmarx.com/hubfs/Amazon_Echo_Research.pdf\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}, {\"url\": \"https://www.checkmarx.com/2018/04/25/eavesdropping-with-amazon-alexa/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.wired.com/story/amazon-echo-alexa-skill-spying/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Press/Media Coverage\", \"Third Party Advisory\"]}, {\"url\": \"https://www.yahoo.com/news/amazon-alexa-bug-let-hackers-104609600.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Press/Media Coverage\", \"Third Party Advisory\"]}, {\"url\": \"https://info.checkmarx.com/hubfs/Amazon_Echo_Research.pdf\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}, {\"url\": \"https://www.checkmarx.com/2018/04/25/eavesdropping-with-amazon-alexa/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.wired.com/story/amazon-echo-alexa-skill-spying/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Press/Media Coverage\", \"Third Party Advisory\"]}, {\"url\": \"https://www.yahoo.com/news/amazon-alexa-bug-let-hackers-104609600.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Press/Media Coverage\", \"Third Party Advisory\"]}]",
      "sourceIdentifier": "cve@mitre.org",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-384\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2018-11567\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2018-05-30T22:29:00.243\",\"lastModified\":\"2024-11-21T03:43:37.953\",\"vulnStatus\":\"Modified\",\"cveTags\":[{\"sourceIdentifier\":\"cve@mitre.org\",\"tags\":[\"disputed\"]}],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Prior to 2018-04-27, the reprompt feature in Amazon Echo devices could be misused by a custom Alexa skill. The reprompt feature is designed so that if Alexa does not receive an input within 8 seconds, the device can speak a reprompt, then wait an additional 8 seconds for input; if the user still does not respond, the microphone is then turned off. The vulnerability involves empty output-speech reprompts, custom wildcard (\\\"gibberish\\\") input slots, and logging of detected speech. If a maliciously designed skill is installed, an attacker could obtain transcripts of speech not intended for Alexa to process, but simply spoken within the device\u0027s hearing range. NOTE: The vendor states \\\"Customer trust is important to us and we take security and privacy seriously. We have put mitigations in place for detecting this type of skill behavior and reject or suppress those skills when we do. Customers do not need to take any action for these mitigations to work.\"},{\"lang\":\"es\",\"value\":\"** EN DISPUTA ** Antes del 27 de abril de 2018, la funci\u00f3n reprompt en los dispositivos de Amazon Echo pod\u00eda ser utilizada de manera incorrecta por una habilidad personalizada de Alexa. La funci\u00f3n reprompt est\u00e1 dise\u00f1ada para que si Alexa no recibe una entrada en 8 segundos, el dispositivo pueda decir un \\\"reprompt\\\" y luego esperar 8 segundos adicionales por la entrada; si el usuario sigue sin responder, el micr\u00f3fono se apaga. La vulnerabilidad incluye reprompts de voz de salida vac\u00eda, ranuras de entrada de wildcards personalizados (\\\"gibberish\\\") y registro del habla detectada. Si se instala una habilidad maliciosamente dise\u00f1ada, un atacante podr\u00eda obtener transcripciones del habla no destinadas a ser procesadas por Alexa, pero que simplemente se digan dentro del rango auditivo del dispositivo. NOTA: El fabricante afirma: \\\"La confianza del cliente es importante para nosotros y nos tomamos en serio la seguridad y la privacidad. Hemos implementado mitigaciones para detectar este tipo de comportamiento de habilidades y rechazar o suprimir esas habilidades cuando lo hacemos. Los clientes no necesitan tomar ninguna acci\u00f3n para que estas mitigaciones funcionen\\\".\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N\",\"baseScore\":3.3,\"baseSeverity\":\"LOW\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.8,\"impactScore\":1.4}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:N/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-384\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amazon:echo_show_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2018-04-27\",\"matchCriteriaId\":\"C537E345-743C-4133-BD30-BDA8FC1D79F8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amazon:echo_show:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B4E70A6-EEA3-406D-892D-890FADCF903B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amazon:echo_plus_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2018-04-27\",\"matchCriteriaId\":\"F068EAC5-7E06-4266-9C3A-2086D668108F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amazon:echo_plus:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4678CA25-4A03-44C8-94F6-E2EF358E11A8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amazon:echo_dot_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2018-04-27\",\"matchCriteriaId\":\"A209937B-9600-4FEE-AFA8-1B06B544C31E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amazon:echo_dot:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB26F1B2-337C-4C76-8A5D-0DA2A2BED079\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amazon:echo_spot_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2018-04-27\",\"matchCriteriaId\":\"86DE3646-EF47-465D-A509-59021D3C6F6A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amazon:echo_spot:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BC230E1-57B7-4ECC-B5F0-DB4B442F32B2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amazon:echo_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2018-04-27\",\"matchCriteriaId\":\"9B1FF2CE-455A-4258-9989-76A4E56F2D5D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amazon:echo:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4DBAF49-9612-4981-95D1-4006D1315E2C\"}]}]}],\"references\":[{\"url\":\"https://info.checkmarx.com/hubfs/Amazon_Echo_Research.pdf\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://www.checkmarx.com/2018/04/25/eavesdropping-with-amazon-alexa/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.wired.com/story/amazon-echo-alexa-skill-spying/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Press/Media Coverage\",\"Third Party Advisory\"]},{\"url\":\"https://www.yahoo.com/news/amazon-alexa-bug-let-hackers-104609600.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Press/Media Coverage\",\"Third Party Advisory\"]},{\"url\":\"https://info.checkmarx.com/hubfs/Amazon_Echo_Research.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://www.checkmarx.com/2018/04/25/eavesdropping-with-amazon-alexa/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.wired.com/story/amazon-echo-alexa-skill-spying/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Press/Media Coverage\",\"Third Party Advisory\"]},{\"url\":\"https://www.yahoo.com/news/amazon-alexa-bug-let-hackers-104609600.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Press/Media Coverage\",\"Third Party Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…