6.8

CVE-2021-3788

An exposed debug interface was reported in some Motorola-branded Binatone Hubble Cameras that could allow an attacker with physical access unauthorized access to the device.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
BinatoneglobalHalo+ Camera Firmware Version < 03.50.14
   BinatoneglobalHalo+ Camera Version-
BinatoneglobalMbp3855 Firmware Version < 03.40.00
   BinatoneglobalMbp3855 Version-
BinatoneglobalFocus 68 Firmware Version-
   BinatoneglobalFocus 68 Versionv100
BinatoneglobalFocus 68 Firmware Version-
   BinatoneglobalFocus 68 Versionv200
BinatoneglobalFocus 72r Firmware Version < 03.40.00
   BinatoneglobalFocus 72r Versionv100
BinatoneglobalFocus 72r Firmware Version < 03.40.00
   BinatoneglobalFocus 72r Versionv200
BinatoneglobalCn28 Firmware Version-
   BinatoneglobalCn28 Version-
BinatoneglobalCn50 Firmware Version-
   BinatoneglobalCn50 Version-
BinatoneglobalMbp4855 Firmware Version-
   BinatoneglobalMbp4855 Version-
BinatoneglobalMbp3667 Firmware Version-
   BinatoneglobalMbp3667 Version-
BinatoneglobalLux 64 Firmware Version-
   BinatoneglobalLux 64 Version-
BinatoneglobalLux 65 Firmware Version-
   BinatoneglobalLux 65 Version-
BinatoneglobalEase44 Firmware Version-
   BinatoneglobalEase44 Version-
BinatoneglobalMbp6855 Firmware Version-
   BinatoneglobalMbp6855 Version-
BinatoneglobalCn40 Firmware Version-
   BinatoneglobalCn40 Version-
BinatoneglobalCn75 Firmware Version-
   BinatoneglobalCn75 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.07% 0.169
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 6.8 0.9 5.9
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 4.6 3.9 6.4
AV:L/AC:L/Au:N/C:P/I:P/A:P
psirt@lenovo.com 6.8 0.9 5.9
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-1299 Missing Protection Mechanism for Alternate Hardware Interface

The lack of protections on alternate paths to access control-protected assets (such as unprotected shadow registers and other external facing unguarded interfaces) allows an attacker to bypass existing protections to the asset that are only performed against the primary path.

CWE-287 Improper Authentication

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.