Products
Smart-tab Android app
- installed April 2023 or earlier
Source
vultures@jpcert.or.jp
Tags
CVE-2024-41999 details
Published : Sept. 30, 2024, 8:15 a.m.
Last Modified : Sept. 30, 2024, 5:35 p.m.
Last Modified : Sept. 30, 2024, 5:35 p.m.
Description
Smart-tab Android app installed April 2023 or earlier contains an active debug code vulnerability. If this vulnerability is exploited, an attacker with physical access to the device may exploit the debug function to gain access to the OS functions, escalate the privilege, change the device's settings, or spoof devices in other rooms.
CVSS Score
1 | 2 | 3 | 4 | 5 | 6.8 | 7 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|---|---|
CWE-489 | Active Debug Code | The product is deployed to unauthorized actors with debugging code still enabled or active, which can create unintended entry points or expose sensitive information. |
CVSS Data
Attack Vector
PHYSICAL
Attack Complexity
LOW
Privileges Required
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
Base Score
6.8
Exploitability Score
0.9
Impact Score
5.9
Base Severity
MEDIUM
Vector String : CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
References
URL | Source |
---|---|
https://jvn.jp/en/jp/JVN42445661/ | vultures@jpcert.or.jp |
https://tsc-soft.co.jp/smart-tab/ | vultures@jpcert.or.jp |
This website uses the NVD API, but is not approved or certified by it.