Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2016-6539

Опубликовано: 06 июл. 2018
Источник: nvd
CVSS3: 3.5
CVSS2: 3.3
EPSS Низкий

Описание

The Trackr device ID is constructed of a manufacturer identifier of four zeroes followed by the BLE MAC address in reverse. The MAC address can be obtained by being in close proximity to the Bluetooth device, effectively exposing the device ID. The ID can be used to track devices. Updated apps, version 5.1.6 for iOS and 2.2.5 for Android, have been released by the vendor to address the vulnerabilities in CVE-2016-6538, CVE-2016-6539, CVE-2016-6540 and CVE-2016-6541.

Ссылки

Уязвимые конфигурации

Конфигурация 1

Одновременно

Одно из

cpe:2.3:o:thetrackr:trackr_firmware:*:*:*:*:*:android:*:*
Версия до 2.2.5 (исключая)
cpe:2.3:o:thetrackr:trackr_firmware:*:*:*:*:*:iphone_os:*:*
Версия до 5.1.6 (исключая)
cpe:2.3:h:thetrackr:trackr:-:*:*:*:*:*:*:*

EPSS

Процентиль: 37%
0.00163
Низкий

3.5 Low

CVSS3

3.3 Low

CVSS2

Дефекты

CWE-200
CWE-200

Связанные уязвимости

CVSS3: 3.5
github
больше 3 лет назад

The Trackr device ID is constructed of a manufacturer identifier of four zeroes followed by the BLE MAC address in reverse. The MAC address can be obtained by being in close proximity to the Bluetooth device, effectively exposing the device ID. The ID can be used to track devices. Updated apps, version 5.1.6 for iOS and 2.2.5 for Android, have been released by the vendor to address the vulnerabilities in CVE-2016-6538, CVE-2016-6539, CVE-2016-6540 and CVE-2016-6541.

EPSS

Процентиль: 37%
0.00163
Низкий

3.5 Low

CVSS3

3.3 Low

CVSS2

Дефекты

CWE-200
CWE-200