6.5

CVE-2018-16265

The bt/bt_core system service in Tizen allows an unprivileged process to create a system user interface and control the Bluetooth pairing process, due to improper D-Bus security policy configurations. This affects Tizen before 5.0 M1, and Tizen-based firmwares including Samsung Galaxy Gear series before build RE2.

Data is provided by the National Vulnerability Database (NVD)
LinuxTizen Version1.0
   SamsungGalaxy Gear Version-
LinuxTizen Version1.0 Updatem1
   SamsungGalaxy Gear Version-
LinuxTizen Version2.0
   SamsungGalaxy Gear Version-
LinuxTizen Version2.1
   SamsungGalaxy Gear Version-
LinuxTizen Version2.2
   SamsungGalaxy Gear Version-
LinuxTizen Version2.2.1
   SamsungGalaxy Gear Version-
LinuxTizen Version2.3
   SamsungGalaxy Gear Version-
LinuxTizen Version2.3.1
   SamsungGalaxy Gear Version-
LinuxTizen Version2.4
   SamsungGalaxy Gear Version-
LinuxTizen Version3.0
   SamsungGalaxy Gear Version-
LinuxTizen Version3.0 Updatem2
   SamsungGalaxy Gear Version-
LinuxTizen Version3.0 Updatem3
   SamsungGalaxy Gear Version-
LinuxTizen Version4.0 Updatem1
   SamsungGalaxy Gear Version-
LinuxTizen Version4.0 Updatem2
   SamsungGalaxy Gear Version-
LinuxTizen Version4.0 Updatem3
   SamsungGalaxy Gear Version-
LinuxTizen Version5.0
   SamsungGalaxy Gear Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.18% 0.399
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 6.5 2.8 3.6
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
nvd@nist.gov 3.3 6.5 2.9
AV:A/AC:L/Au:N/C:N/I:P/A:N
CWE-269 Improper Privilege Management

The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.