var-201703-0266
Vulnerability from variot

The Soft Access Point (AP) feature in Samsung Smart TVs X10P, X12, X14H, X14J, and NT14U and Xpress M288OFW printers generate weak WPA2 PSK keys, which makes it easier for remote attackers to obtain sensitive information or bypass authentication via a brute-force attack. Samsung SmartTV and Printers are prone to a security vulnerability that may allow attackers to obtain sensitive information. Attackers can exploit this issue with brute-force techniques to obtain passwords that can aid in further attacks. Samsung Smart TVs X10P, etc. are all smart TVs of South Korea's Samsung (Samsung) that integrate network content, Apps applications, AllShare content, search functions, and traditional TV channel lists into one user interface. Soft Access Point (AP) is one of the wireless access functions. There are security vulnerabilities in the Soft AP function of several Samsung products. The following products are affected: Samsung Smart TVs X10P, X12, X14H, X14J, NT14U, Xpress M288OFW. ================================================================ Samsung softap weak random generated password (This affects SmartTV and Printers) ================================================================

Information


Vulnerability Type : Weak password Vulnerable Version : many Severity: Medium Author – Augusto Pereyra CVE-ID: CVE-2015-5729 (waiting) Twitter: @aedpereyra

Description


Samsung SoftAP WPA2-PSK weak password randomly generated. It’s possible intersept wpa2-psk handshake and crack the password using aircrack in a few hours

Detailed description


http://kaoticoneutral.blogspot.com.ar/2015/12/samsung-smarttv-and-printers-weak.html

Severity Level:

Medium

Description:

Vulnerable Product:

[+] Samsung Smartvs with wifi included (Some of this firmware could be in process) Model Firmware patched X10P EU T-MST10PDEUCB-1210.0 X10P US T-MST10PAUSCB-1300.0 X10P US T-MST10PAUSCP-1302.0 X10P IBR T-MST10PIBRCB-1104.0 X12 EU T-MST12DEUCB-1111.4 X12 US T-MST12AKUCB-1114.0 X14H EU T-MST14DEUCB-1023.0 X14H US T-MST14AKUCB-1100.4 X14H CN T-MST14DCNCB-1010.0 X14J CN T-MS14JDCNCB-1004.2 X14J US T-MS14JAKUCB - 1102.5 X14J EU T-MS14JDEUCB-1018.0 NT14U EU T-NT14UDEUCB-1007.1 NT14U US T-NT14UAKUCB-1008.0 NT14U CN T-NT14UDCNCB-1003.1

[+] May be all printers Xpress series. Confirmed in M288OFW

Vulnerable Parameter(s):

[+] WPA2 password

Advisory Timeline


20-Jul-2015- Reported 27-Jul-2015- Vendor Response 02-Dec-2015- Vendor Fixed some models 17-Dec-2015- Public disclosed

Fixed Version:


All version could be fixed if you read the workaround described in "Detailed Description"

Reference


https://samsungtvbounty.com/HallofFame.aspx

http://kaoticoneutral.blogspot.com.ar/2015/12/samsung-smarttv-and-printers-weak.html

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201703-0266",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "m288ofw",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "samsung",
        "version": null
      },
      {
        "model": "x10p",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "samsung",
        "version": "t-mst10pdeucb-1210.0"
      },
      {
        "model": "x14j",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "samsung",
        "version": "t-ms14jdcncb-1004.2"
      },
      {
        "model": "x10p",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "samsung",
        "version": "t-mst10pauscp-1302.0"
      },
      {
        "model": "x14h",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "samsung",
        "version": "t-mst14deucb-1023.0"
      },
      {
        "model": "x10p",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "samsung",
        "version": "t-mst10pibrcb-1104.0"
      },
      {
        "model": "nt14u",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "samsung",
        "version": "t-nt14udeucb-1007.1"
      },
      {
        "model": "x14h",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "samsung",
        "version": "t-mst14akucb-1100.4"
      },
      {
        "model": "x14j",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "samsung",
        "version": "t-ms14jdeucb-1018.0"
      },
      {
        "model": "x12",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "samsung",
        "version": "t-mst12deucb-1111.4"
      },
      {
        "model": "xpress series printer m288ofw",
        "scope": null,
        "trust": 1.1,
        "vendor": "samsung",
        "version": null
      },
      {
        "model": "x12",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "samsung",
        "version": "t-mst12akucb-1114.0"
      },
      {
        "model": "nt14u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "samsung",
        "version": "t-nt14uakucb-1008.0"
      },
      {
        "model": "x14h",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "samsung",
        "version": "t-mst14dcncb-1010.0"
      },
      {
        "model": "nt14u",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "samsung",
        "version": "t-nt14udcncb-1003.1"
      },
      {
        "model": "x14j",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "samsung",
        "version": "t-ms14jakucb-1102.5"
      },
      {
        "model": "smart tv nt14u",
        "scope": null,
        "trust": 0.8,
        "vendor": "samsung",
        "version": null
      },
      {
        "model": "smart tv x10p",
        "scope": null,
        "trust": 0.8,
        "vendor": "samsung",
        "version": null
      },
      {
        "model": "smart tv x12",
        "scope": null,
        "trust": 0.8,
        "vendor": "samsung",
        "version": null
      },
      {
        "model": "smart tv x14h",
        "scope": null,
        "trust": 0.8,
        "vendor": "samsung",
        "version": null
      },
      {
        "model": "smart tv x14j",
        "scope": null,
        "trust": 0.8,
        "vendor": "samsung",
        "version": null
      },
      {
        "model": "smarttv",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "samsung",
        "version": "0"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "79675"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007452"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-5729"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201512-591"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:samsung:nt14u_firmware:t-nt14uakucb-1008.0:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:samsung:nt14u_us:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:samsung:x14j_firmware:t-ms14jakucb-1102.5:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:samsung:x14j_us:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:samsung:x14h_firmware:t-mst14dcncb-1010.0:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:samsung:x14h_cn:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:samsung:x12_firmware:t-mst12akucb-1114.0:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:samsung:x12_us:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:samsung:x10p_firmware:t-mst10pibrcb-1104.0:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:samsung:x10p_ibr:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:samsung:nt14u_firmware:t-nt14udeucb-1007.1:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:samsung:nt14u_eu:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:samsung:nt14u_firmware:t-nt14udcncb-1003.1:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:samsung:nt14u_cn:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:samsung:x14j_firmware:t-ms14jdeucb-1018.0:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:samsung:x14j_eu:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:samsung:x14j_firmware:t-ms14jdcncb-1004.2:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:samsung:x14j_cn:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:samsung:x14h_firmware:t-mst14akucb-1100.4:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:samsung:x14h_us:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:samsung:x14h_firmware:t-mst14deucb-1023.0:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:samsung:x14h_eu:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:samsung:x12_firmware:t-mst12deucb-1111.4:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:samsung:x12_eu:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:samsung:x10p_firmware:t-mst10pauscp-1302.0:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:samsung:x10p_us:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:samsung:x10p_firmware:t-mst10pdeucb-1210.0:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:samsung:x10p_eu:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:samsung:m288ofw_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:samsung:m288ofw:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2015-5729"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Augusto Pereyra",
    "sources": [
      {
        "db": "BID",
        "id": "79675"
      },
      {
        "db": "PACKETSTORM",
        "id": "134976"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201512-591"
      }
    ],
    "trust": 1.0
  },
  "cve": "CVE-2015-5729",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 5.0,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "CVE-2015-5729",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-83690",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "NVD",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 9.8,
            "baseSeverity": "Critical",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2015-5729",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2015-5729",
            "trust": 1.8,
            "value": "CRITICAL"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201512-591",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-83690",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-83690"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007452"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-5729"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201512-591"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The Soft Access Point (AP) feature in Samsung Smart TVs X10P, X12, X14H, X14J, and NT14U and Xpress M288OFW printers generate weak WPA2 PSK keys, which makes it easier for remote attackers to obtain sensitive information or bypass authentication via a brute-force attack. Samsung SmartTV and Printers are prone to a security vulnerability that may allow attackers to obtain sensitive information. \nAttackers can exploit this issue with brute-force techniques to obtain passwords that can aid in further attacks. Samsung Smart TVs X10P, etc. are all smart TVs of South Korea\u0027s Samsung (Samsung) that integrate network content, Apps applications, AllShare content, search functions, and traditional TV channel lists into one user interface. Soft Access Point (AP) is one of the wireless access functions. There are security vulnerabilities in the Soft AP function of several Samsung products. The following products are affected: Samsung Smart TVs X10P, X12, X14H, X14J, NT14U, Xpress M288OFW. ================================================================\nSamsung softap weak random generated password (This affects SmartTV and\nPrinters)\n================================================================\n\nInformation\n**********************\n\nVulnerability Type : Weak password\nVulnerable Version : many\nSeverity: Medium\nAuthor \u2013 Augusto Pereyra\nCVE-ID: CVE-2015-5729 (waiting)\nTwitter: @aedpereyra\n\nDescription\n***********************\n\nSamsung SoftAP WPA2-PSK weak password randomly generated. It\u2019s possible\nintersept wpa2-psk handshake and crack the password using aircrack in a few\nhours\n\nDetailed description\n**************************\nhttp://kaoticoneutral.blogspot.com.ar/2015/12/samsung-smarttv-and-printers-weak.html\n\nSeverity Level:\n=========================================================\nMedium\n\nDescription:\n==========================================================\n\nVulnerable Product:\n\n[+] Samsung Smartvs with wifi included (Some of this firmware could be in\nprocess)\nModel Firmware patched\nX10P EU T-MST10PDEUCB-1210.0\nX10P US\nT-MST10PAUSCB-1300.0\nX10P US T-MST10PAUSCP-1302.0\nX10P IBR T-MST10PIBRCB-1104.0\nX12 EU T-MST12DEUCB-1111.4\nX12 US T-MST12AKUCB-1114.0\nX14H EU T-MST14DEUCB-1023.0\nX14H US T-MST14AKUCB-1100.4\nX14H CN T-MST14DCNCB-1010.0\nX14J CN T-MS14JDCNCB-1004.2\nX14J US T-MS14JAKUCB - 1102.5\nX14J EU T-MS14JDEUCB-1018.0\nNT14U EU T-NT14UDEUCB-1007.1\nNT14U US T-NT14UAKUCB-1008.0\nNT14U CN T-NT14UDCNCB-1003.1\n\n[+]  May be all printers Xpress series. Confirmed in M288OFW\n\nVulnerable Parameter(s):\n\n[+]  WPA2 password\n\nAdvisory Timeline\n************************\n\n20-Jul-2015- Reported\n27-Jul-2015- Vendor Response\n02-Dec-2015- Vendor Fixed some models\n17-Dec-2015- Public disclosed\n\nFixed Version:\n*****************\n\nAll version could be fixed if you read the workaround described in\n\"Detailed Description\"\n\nReference\n*****************\n\nhttps://samsungtvbounty.com/HallofFame.aspx\n\nhttp://kaoticoneutral.blogspot.com.ar/2015/12/samsung-smarttv-and-printers-weak.html\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2015-5729"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007452"
      },
      {
        "db": "BID",
        "id": "79675"
      },
      {
        "db": "VULHUB",
        "id": "VHN-83690"
      },
      {
        "db": "PACKETSTORM",
        "id": "134976"
      }
    ],
    "trust": 2.07
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-83690",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-83690"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2015-5729",
        "trust": 2.9
      },
      {
        "db": "PACKETSTORM",
        "id": "134976",
        "trust": 2.6
      },
      {
        "db": "BID",
        "id": "79675",
        "trust": 2.0
      },
      {
        "db": "SECTRACK",
        "id": "1034504",
        "trust": 1.7
      },
      {
        "db": "SECTRACK",
        "id": "1034503",
        "trust": 1.7
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007452",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201512-591",
        "trust": 0.7
      },
      {
        "db": "VULHUB",
        "id": "VHN-83690",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-83690"
      },
      {
        "db": "BID",
        "id": "79675"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007452"
      },
      {
        "db": "PACKETSTORM",
        "id": "134976"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-5729"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201512-591"
      }
    ]
  },
  "id": "VAR-201703-0266",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-83690"
      }
    ],
    "trust": 0.85
  },
  "last_update_date": "2023-12-18T13:19:36.422000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "\u30c8\u30c3\u30d7\u30da\u30fc\u30b8",
        "trust": 0.8,
        "url": "http://www.galaxymobile.jp/"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007452"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-200",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-83690"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007452"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-5729"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.5,
        "url": "http://packetstormsecurity.com/files/134976/samsung-softap-weak-password.html"
      },
      {
        "trust": 2.1,
        "url": "http://kaoticoneutral.blogspot.com.ar/2015/12/samsung-smarttv-and-printers-weak.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/79675"
      },
      {
        "trust": 1.7,
        "url": "http://seclists.org/fulldisclosure/2015/dec/79"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id/1034503"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id/1034504"
      },
      {
        "trust": 0.9,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-5729"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-5729"
      },
      {
        "trust": 0.8,
        "url": "http://kaoticoneutral.blogspot.jp/2015/12/samsung-smarttv-and-printers-weak.html"
      },
      {
        "trust": 0.3,
        "url": "http://www.samsung.com/"
      },
      {
        "trust": 0.1,
        "url": "https://samsungtvbounty.com/halloffame.aspx"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-83690"
      },
      {
        "db": "BID",
        "id": "79675"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007452"
      },
      {
        "db": "PACKETSTORM",
        "id": "134976"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-5729"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201512-591"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-83690"
      },
      {
        "db": "BID",
        "id": "79675"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007452"
      },
      {
        "db": "PACKETSTORM",
        "id": "134976"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-5729"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201512-591"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-03-23T00:00:00",
        "db": "VULHUB",
        "id": "VHN-83690"
      },
      {
        "date": "2015-12-17T00:00:00",
        "db": "BID",
        "id": "79675"
      },
      {
        "date": "2017-05-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2015-007452"
      },
      {
        "date": "2015-12-18T21:10:57",
        "db": "PACKETSTORM",
        "id": "134976"
      },
      {
        "date": "2017-03-23T20:59:00.390000",
        "db": "NVD",
        "id": "CVE-2015-5729"
      },
      {
        "date": "2015-12-25T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201512-591"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-04-04T00:00:00",
        "db": "VULHUB",
        "id": "VHN-83690"
      },
      {
        "date": "2015-12-17T00:00:00",
        "db": "BID",
        "id": "79675"
      },
      {
        "date": "2017-05-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2015-007452"
      },
      {
        "date": "2017-04-04T16:15:13.807000",
        "db": "NVD",
        "id": "CVE-2015-5729"
      },
      {
        "date": "2017-03-24T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201512-591"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201512-591"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Samsung Smart TV and  Xpress of  Soft Access Point Vulnerabilities that capture important information on functions",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-007452"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "information disclosure",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201512-591"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.