Samsung Gear S2

CPE Details

Samsung Gear S2
-
2018-02-06
00h15 +00:00
2021-05-11
14h28 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:h:samsung:gear_s2:-:*:*:*:*:*:*:*

Informations

Vendor

samsung

Product

gear_s2

Version

-

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2021-25424 2021-06-11 12h33 +00:00 Improper authentication vulnerability in Tizen bluetooth-frwk prior to Firmware update JUN-2021 Release allows bluetooth attacker to take over the user's bluetooth device without user awareness.
8.8
High
CVE-2018-16272 2020-01-22 12h04 +00:00 The wpa_supplicant system service in Samsung Galaxy Gear series allows an unprivileged process to fully control the Wi-Fi interface, due to the lack of its D-Bus security policy configurations. This affects Tizen-based firmwares including Samsung Galaxy Gear series before build RE2.
9.8
Critical
CVE-2018-16271 2020-01-22 12h03 +00:00 The wemail_consumer_service (from the built-in application wemail) in Samsung Galaxy Gear series allows an unprivileged process to manipulate a user's mailbox, due to improper D-Bus security policy configurations. An arbitrary email can also be sent from the mailbox via the paired smartphone. This affects Tizen-based firmwares including Samsung Galaxy Gear series before build RE2.
6.5
Medium
CVE-2018-16270 2020-01-22 12h01 +00:00 Samsung Galaxy Gear series before build RE2 includes the hcidump utility with no privilege or permission restriction. This allows an unprivileged process to dump Bluetooth HCI packets to an arbitrary file path.
7.5
High
CVE-2018-16269 2020-01-22 11h59 +00:00 The wnoti system service in Samsung Galaxy Gear series allows an unprivileged process to take over the internal notification message data, due to improper D-Bus security policy configurations. This affects Tizen-based firmwares including Samsung Galaxy Gear series before build RE2.
7.5
High
CVE-2017-17860 2018-01-18 22h00 +00:00 In Samsung Gear products, Bluetooth link key is updated to the different key which is same with attacker's link key. It can be attacked without user's intention only if attacker can reveal the Bluetooth address of target device and paired user's smartphone
5.7
Medium