CVE-2024-36557

Feb. 10, 2025, 3:15 p.m.

6.6
Medium

Description

The device ID is based on IMEI in Forever KidsWatch Call Me KW50 R36_YDR_A3PW_GM7S_V1.0_2019_07_15_16.19.24_cob_h and Forever KidsWatch Call Me 2 KW60 R36CW_YDE_S4_A29_2_V1.0_2023.05.24_22.49.44_cob_b. If a malicious user changes the IMEI to the IMEI of a unit they registered in the mobile app, it is possible to hijack the device and control it from the app.

Product(s) Impacted

Product Versions
Forever KidsWatch Call Me KW50
  • R36_YDR_A3PW_GM7S_V1.0_2019_07_15_16.19.24_cob_h
Forever KidsWatch Call Me 2 KW60
  • R36CW_YDE_S4_A29_2_V1.0_2023.05.24_22.49.44_cob_b

Weaknesses

CWE-290
Authentication Bypass by Spoofing
This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks.

CVSS Score

6.6 / 10

CVSS Data

  • Attack Vector: PHYSICAL
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • View Vector String

    CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Date

  • Published: Feb. 6, 2025, 6:15 p.m.
  • Last Modified: Feb. 10, 2025, 3:15 p.m.

Status : Awaiting Analysis

CVE has been recently published to the CVE List and has been received by the NVD.

More info

Source

cve@mitre.org

*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.