6.8
CVE-2021-3788
- EPSS 0.07%
- Veröffentlicht 12.11.2021 22:15:08
- Zuletzt bearbeitet 21.11.2024 06:22:26
- Quelle psirt@lenovo.com
- CVE-Watchlists
- Unerledigt
An exposed debug interface was reported in some Motorola-branded Binatone Hubble Cameras that could allow an attacker with physical access unauthorized access to the device.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Binatoneglobal ≫ Halo+ Camera Firmware Version < 03.50.14
Binatoneglobal ≫ Comfort 85 Connect Firmware Version < 03.40.02
Binatoneglobal ≫ Mbp3855 Firmware Version < 03.40.00
Binatoneglobal ≫ Focus 68 Firmware Version-
Binatoneglobal ≫ Focus 68 Firmware Version-
Binatoneglobal ≫ Focus 72r Firmware Version < 03.40.00
Binatoneglobal ≫ Focus 72r Firmware Version < 03.40.00
Binatoneglobal ≫ Cn28 Firmware Version-
Binatoneglobal ≫ Cn50 Firmware Version-
Binatoneglobal ≫ Comfort 40 Firmware Version-
Binatoneglobal ≫ Comfort 50 Connect Firmware Version-
Binatoneglobal ≫ Mbp4855 Firmware Version-
Binatoneglobal ≫ Mbp3667 Firmware Version-
Binatoneglobal ≫ Mbp669 Connect Firmware Version-
Binatoneglobal ≫ Lux 64 Firmware Version-
Binatoneglobal ≫ Lux 65 Firmware Version-
Binatoneglobal ≫ Connect View 65 Firmware Version-
Binatoneglobal ≫ Lux 85 Connect Firmware Version-
Binatoneglobal ≫ Ease44 Firmware Version-
Binatoneglobal ≫ Connect 20 Firmware Version-
Binatoneglobal ≫ Mbp6855 Firmware Version-
Binatoneglobal ≫ Cn40 Firmware Version-
Binatoneglobal ≫ Cn75 Firmware Version-
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.07% | 0.169 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 6.8 | 0.9 | 5.9 |
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
| nvd@nist.gov | 4.6 | 3.9 | 6.4 |
AV:L/AC:L/Au:N/C:P/I:P/A:P
|
| psirt@lenovo.com | 6.8 | 0.9 | 5.9 |
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
CWE-1299 Missing Protection Mechanism for Alternate Hardware Interface
The lack of protections on alternate paths to access control-protected assets (such as unprotected shadow registers and other external facing unguarded interfaces) allows an attacker to bypass existing protections to the asset that are only performed against the primary path.
CWE-287 Improper Authentication
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.