Search criteria
6 vulnerabilities found for mbp3667 by binatoneglobal
VAR-202111-0514
Vulnerability from variot - Updated: 2024-11-23 23:07An exposed debug interface was reported in some Motorola-branded Binatone Hubble Cameras that could allow an attacker with physical access unauthorized access to the device. plural Motorola-branded Binatone Hubble Cameras contain an authentication vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Binatone Motorola-branded Camera is a Motorola-branded product camera produced by Binatone authorized by Binatone
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202111-0514",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "cn28",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "cn75",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "mbp4855",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "cn50",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "mbp3667",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "connect view 65",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "focus 72r",
"scope": "lt",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": "03.40.00"
},
{
"model": "halo\\+ camera",
"scope": "lt",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": "03.50.14"
},
{
"model": "connect 20",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "lux 64",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "mbp3855",
"scope": "lt",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": "03.40.00"
},
{
"model": "lux 65",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "comfort 85 connect",
"scope": "lt",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": "03.40.02"
},
{
"model": "cn40",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "comfort 40",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "focus 68",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "comfort 50 connect",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "ease44",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "lux 85 connect",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "mbp669 connect",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "mbp6855",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "comfort 50 connect",
"scope": null,
"trust": 0.8,
"vendor": "binatone global",
"version": null
},
{
"model": "comfort 40",
"scope": null,
"trust": 0.8,
"vendor": "binatone global",
"version": null
},
{
"model": "cn28",
"scope": null,
"trust": 0.8,
"vendor": "binatone global",
"version": null
},
{
"model": "cn50",
"scope": null,
"trust": 0.8,
"vendor": "binatone global",
"version": null
},
{
"model": "mbp3855",
"scope": null,
"trust": 0.8,
"vendor": "binatone global",
"version": null
},
{
"model": "halo+ \u30ab\u30e1\u30e9",
"scope": null,
"trust": 0.8,
"vendor": "binatone global",
"version": null
},
{
"model": "mbp4855",
"scope": null,
"trust": 0.8,
"vendor": "binatone global",
"version": null
},
{
"model": "focus 72r",
"scope": null,
"trust": 0.8,
"vendor": "binatone global",
"version": null
},
{
"model": "comfort 85 connect",
"scope": null,
"trust": 0.8,
"vendor": "binatone global",
"version": null
},
{
"model": "focus 68",
"scope": null,
"trust": 0.8,
"vendor": "binatone global",
"version": null
},
{
"model": "motorola-branded camera",
"scope": null,
"trust": 0.6,
"vendor": "binatone",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-77539"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-014940"
},
{
"db": "NVD",
"id": "CVE-2021-3788"
}
]
},
"cve": "CVE-2021-3788",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "CVE-2021-3788",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "CNVD-2022-77539",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 0.9,
"id": "CVE-2021-3788",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 2.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Physical",
"author": "OTHER",
"availabilityImpact": "High",
"baseScore": 6.8,
"baseSeverity": "Medium",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "JVNDB-2021-014940",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2021-3788",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "psirt@lenovo.com",
"id": "CVE-2021-3788",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2021-3788",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2022-77539",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-202111-1173",
"trust": 0.6,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-77539"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-014940"
},
{
"db": "CNNVD",
"id": "CNNVD-202111-1173"
},
{
"db": "NVD",
"id": "CVE-2021-3788"
},
{
"db": "NVD",
"id": "CVE-2021-3788"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "An exposed debug interface was reported in some Motorola-branded Binatone Hubble Cameras that could allow an attacker with physical access unauthorized access to the device. plural Motorola-branded Binatone Hubble Cameras contain an authentication vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Binatone Motorola-branded Camera is a Motorola-branded product camera produced by Binatone authorized by Binatone",
"sources": [
{
"db": "NVD",
"id": "CVE-2021-3788"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-014940"
},
{
"db": "CNVD",
"id": "CNVD-2022-77539"
}
],
"trust": 2.16
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2021-3788",
"trust": 3.8
},
{
"db": "JVNDB",
"id": "JVNDB-2021-014940",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2022-77539",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202111-1173",
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-77539"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-014940"
},
{
"db": "CNNVD",
"id": "CNNVD-202111-1173"
},
{
"db": "NVD",
"id": "CVE-2021-3788"
}
]
},
"id": "VAR-202111-0514",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-77539"
}
],
"trust": 1.6
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"IoT"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-77539"
}
]
},
"last_update_date": "2024-11-23T23:07:35.303000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Binatone\u00a0Motorola-branded\u00a0Camera\u00a0Vulnerabilities",
"trust": 0.8,
"url": "https://binatoneglobal.com/security-advisory/"
},
{
"title": "Patch for Binatone Motorola-branded Camera Authorization Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/360886"
},
{
"title": "Binatone Motorola-branded Camera Security vulnerabilities",
"trust": 0.6,
"url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=169732"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-77539"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-014940"
},
{
"db": "CNNVD",
"id": "CNNVD-202111-1173"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-287",
"trust": 1.0
},
{
"problemtype": "CWE-1299",
"trust": 1.0
},
{
"problemtype": "Inappropriate authentication (CWE-287) [NVD evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2021-014940"
},
{
"db": "NVD",
"id": "CVE-2021-3788"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.2,
"url": "https://binatoneglobal.com/security-advisory/"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-3788"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-77539"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-014940"
},
{
"db": "CNNVD",
"id": "CNNVD-202111-1173"
},
{
"db": "NVD",
"id": "CVE-2021-3788"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2022-77539"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-014940"
},
{
"db": "CNNVD",
"id": "CNNVD-202111-1173"
},
{
"db": "NVD",
"id": "CVE-2021-3788"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2022-11-16T00:00:00",
"db": "CNVD",
"id": "CNVD-2022-77539"
},
{
"date": "2022-11-02T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2021-014940"
},
{
"date": "2021-11-12T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202111-1173"
},
{
"date": "2021-11-12T22:15:08.213000",
"db": "NVD",
"id": "CVE-2021-3788"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2022-11-16T00:00:00",
"db": "CNVD",
"id": "CNVD-2022-77539"
},
{
"date": "2022-11-02T05:32:00",
"db": "JVNDB",
"id": "JVNDB-2021-014940"
},
{
"date": "2022-10-28T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202111-1173"
},
{
"date": "2024-11-21T06:22:26.123000",
"db": "NVD",
"id": "CVE-2021-3788"
}
]
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural \u00a0Motorola-branded\u00a0Binatone\u00a0Hubble\u00a0 Camera Authentication Vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2021-014940"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "authorization issue",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202111-1173"
}
],
"trust": 0.6
}
}
VAR-202111-0512
Vulnerability from variot - Updated: 2024-11-23 22:47A buffer overflow was reported in the local web server of some Motorola-branded Binatone Hubble Cameras that could allow an unauthenticated attacker on the same network to perform a denial-of-service attack against the device. plural Motorola-branded Binatone Hubble Cameras contain a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state. Binatone Motorola-branded Camera is a Motorola brand product camera authorized by Binatone Company
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202111-0512",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "cn28",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "cn75",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "mbp4855",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "cn50",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "mbp3667",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "connect view 65",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "focus 72r",
"scope": "lt",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": "03.40.00"
},
{
"model": "halo\\+ camera",
"scope": "lt",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": "03.50.14"
},
{
"model": "connect 20",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "lux 64",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "mbp3855",
"scope": "lt",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": "03.40.00"
},
{
"model": "lux 65",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "comfort 85 connect",
"scope": "lt",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": "03.40.02"
},
{
"model": "cn40",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "comfort 40",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "focus 68",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "comfort 50 connect",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "ease44",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "lux 85 connect",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "mbp669 connect",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "mbp6855",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "comfort 50 connect",
"scope": null,
"trust": 0.8,
"vendor": "binatone global",
"version": null
},
{
"model": "comfort 40",
"scope": null,
"trust": 0.8,
"vendor": "binatone global",
"version": null
},
{
"model": "cn28",
"scope": null,
"trust": 0.8,
"vendor": "binatone global",
"version": null
},
{
"model": "cn50",
"scope": null,
"trust": 0.8,
"vendor": "binatone global",
"version": null
},
{
"model": "mbp3855",
"scope": null,
"trust": 0.8,
"vendor": "binatone global",
"version": null
},
{
"model": "halo+ \u30ab\u30e1\u30e9",
"scope": null,
"trust": 0.8,
"vendor": "binatone global",
"version": null
},
{
"model": "mbp4855",
"scope": null,
"trust": 0.8,
"vendor": "binatone global",
"version": null
},
{
"model": "focus 72r",
"scope": null,
"trust": 0.8,
"vendor": "binatone global",
"version": null
},
{
"model": "comfort 85 connect",
"scope": null,
"trust": 0.8,
"vendor": "binatone global",
"version": null
},
{
"model": "focus 68",
"scope": null,
"trust": 0.8,
"vendor": "binatone global",
"version": null
},
{
"model": "motorola-branded camera",
"scope": null,
"trust": 0.6,
"vendor": "binatone",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-77541"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-014942"
},
{
"db": "NVD",
"id": "CVE-2021-3790"
}
]
},
"cve": "CVE-2021-3790",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 3.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 6.5,
"id": "CVE-2021-3790",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "LOW",
"trust": 1.8,
"vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 3.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 6.5,
"id": "CNVD-2022-77541",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "LOW",
"trust": 0.6,
"vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "ADJACENT",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"exploitabilityScore": 2.8,
"id": "CVE-2021-3790",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 2.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Adjacent Network",
"author": "OTHER",
"availabilityImpact": "High",
"baseScore": 6.5,
"baseSeverity": "Medium",
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "JVNDB-2021-014942",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2021-3790",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "psirt@lenovo.com",
"id": "CVE-2021-3790",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2021-3790",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2022-77541",
"trust": 0.6,
"value": "LOW"
},
{
"author": "CNNVD",
"id": "CNNVD-202111-1175",
"trust": 0.6,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-77541"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-014942"
},
{
"db": "CNNVD",
"id": "CNNVD-202111-1175"
},
{
"db": "NVD",
"id": "CVE-2021-3790"
},
{
"db": "NVD",
"id": "CVE-2021-3790"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "A buffer overflow was reported in the local web server of some Motorola-branded Binatone Hubble Cameras that could allow an unauthenticated attacker on the same network to perform a denial-of-service attack against the device. plural Motorola-branded Binatone Hubble Cameras contain a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state. Binatone Motorola-branded Camera is a Motorola brand product camera authorized by Binatone Company",
"sources": [
{
"db": "NVD",
"id": "CVE-2021-3790"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-014942"
},
{
"db": "CNVD",
"id": "CNVD-2022-77541"
}
],
"trust": 2.16
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2021-3790",
"trust": 3.8
},
{
"db": "JVNDB",
"id": "JVNDB-2021-014942",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2022-77541",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202111-1175",
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-77541"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-014942"
},
{
"db": "CNNVD",
"id": "CNNVD-202111-1175"
},
{
"db": "NVD",
"id": "CVE-2021-3790"
}
]
},
"id": "VAR-202111-0512",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-77541"
}
],
"trust": 1.6
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"IoT"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-77541"
}
]
},
"last_update_date": "2024-11-23T22:47:37.514000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Binatone\u00a0Motorola-branded\u00a0Camera\u00a0Vulnerabilities",
"trust": 0.8,
"url": "https://binatoneglobal.com/security-advisory/"
},
{
"title": "Patch for Binatone Motorola-branded Camera Buffer Overflow Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/360876"
},
{
"title": "Binatone Motorola-branded Camera Security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=170333"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-77541"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-014942"
},
{
"db": "CNNVD",
"id": "CNNVD-202111-1175"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-120",
"trust": 1.0
},
{
"problemtype": "CWE-121",
"trust": 1.0
},
{
"problemtype": "Classic buffer overflow (CWE-120) [NVD evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2021-014942"
},
{
"db": "NVD",
"id": "CVE-2021-3790"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.2,
"url": "https://binatoneglobal.com/security-advisory/"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-3790"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-77541"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-014942"
},
{
"db": "CNNVD",
"id": "CNNVD-202111-1175"
},
{
"db": "NVD",
"id": "CVE-2021-3790"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2022-77541"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-014942"
},
{
"db": "CNNVD",
"id": "CNNVD-202111-1175"
},
{
"db": "NVD",
"id": "CVE-2021-3790"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2022-11-16T00:00:00",
"db": "CNVD",
"id": "CNVD-2022-77541"
},
{
"date": "2022-11-02T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2021-014942"
},
{
"date": "2021-11-12T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202111-1175"
},
{
"date": "2021-11-12T22:15:08.317000",
"db": "NVD",
"id": "CVE-2021-3790"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2022-11-16T00:00:00",
"db": "CNVD",
"id": "CNVD-2022-77541"
},
{
"date": "2022-11-02T05:32:00",
"db": "JVNDB",
"id": "JVNDB-2021-014942"
},
{
"date": "2022-07-01T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202111-1175"
},
{
"date": "2024-11-21T06:22:26.470000",
"db": "NVD",
"id": "CVE-2021-3790"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote or local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202111-1175"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural \u00a0Motorola-branded\u00a0Binatone\u00a0Hubble\u00a0 Classic buffer overflow vulnerability in camera",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2021-014942"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "other",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202111-1175"
}
],
"trust": 0.6
}
}
VAR-202111-0513
Vulnerability from variot - Updated: 2024-11-23 22:44An information disclosure vulnerability was reported in some Motorola-branded Binatone Hubble Cameras that could allow an attacker with physical access to obtain the encryption key used to decrypt firmware update packages. plural Motorola-branded Binatone Hubble The camera has a cryptographic strength vulnerability.Information may be obtained. Binatone Motorola-branded Camera is a Motorola brand product camera produced by Binatone authorized by Binatone
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202111-0513",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "cn28",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "cn75",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "mbp4855",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "cn50",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "mbp3667",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "connect view 65",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "focus 72r",
"scope": "lt",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": "03.40.00"
},
{
"model": "halo\\+ camera",
"scope": "lt",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": "03.50.14"
},
{
"model": "connect 20",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "lux 64",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "mbp3855",
"scope": "lt",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": "03.40.00"
},
{
"model": "lux 65",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "comfort 85 connect",
"scope": "lt",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": "03.40.02"
},
{
"model": "cn40",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "comfort 40",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "focus 68",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "comfort 50 connect",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "ease44",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "lux 85 connect",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "mbp669 connect",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "mbp6855",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "comfort 50 connect",
"scope": null,
"trust": 0.8,
"vendor": "binatone global",
"version": null
},
{
"model": "comfort 40",
"scope": null,
"trust": 0.8,
"vendor": "binatone global",
"version": null
},
{
"model": "cn28",
"scope": null,
"trust": 0.8,
"vendor": "binatone global",
"version": null
},
{
"model": "cn50",
"scope": null,
"trust": 0.8,
"vendor": "binatone global",
"version": null
},
{
"model": "mbp3855",
"scope": null,
"trust": 0.8,
"vendor": "binatone global",
"version": null
},
{
"model": "halo+ \u30ab\u30e1\u30e9",
"scope": null,
"trust": 0.8,
"vendor": "binatone global",
"version": null
},
{
"model": "mbp4855",
"scope": null,
"trust": 0.8,
"vendor": "binatone global",
"version": null
},
{
"model": "focus 72r",
"scope": null,
"trust": 0.8,
"vendor": "binatone global",
"version": null
},
{
"model": "comfort 85 connect",
"scope": null,
"trust": 0.8,
"vendor": "binatone global",
"version": null
},
{
"model": "focus 68",
"scope": null,
"trust": 0.8,
"vendor": "binatone global",
"version": null
},
{
"model": "motorola-branded camera",
"scope": null,
"trust": 0.6,
"vendor": "binatone",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-77540"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-014941"
},
{
"db": "NVD",
"id": "CVE-2021-3789"
}
]
},
"cve": "CVE-2021-3789",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "CVE-2021-3789",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "LOW",
"trust": 1.8,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "CNVD-2022-77540",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "LOW",
"trust": 0.6,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 0.9,
"id": "CVE-2021-3789",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
{
"attackComplexity": "HIGH",
"attackVector": "PHYSICAL",
"author": "psirt@lenovo.com",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 0.5,
"id": "CVE-2021-3789",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Physical",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 4.6,
"baseSeverity": "Medium",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2021-3789",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2021-3789",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "psirt@lenovo.com",
"id": "CVE-2021-3789",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2021-3789",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2022-77540",
"trust": 0.6,
"value": "LOW"
},
{
"author": "CNNVD",
"id": "CNNVD-202111-1174",
"trust": 0.6,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-77540"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-014941"
},
{
"db": "CNNVD",
"id": "CNNVD-202111-1174"
},
{
"db": "NVD",
"id": "CVE-2021-3789"
},
{
"db": "NVD",
"id": "CVE-2021-3789"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "An information disclosure vulnerability was reported in some Motorola-branded Binatone Hubble Cameras that could allow an attacker with physical access to obtain the encryption key used to decrypt firmware update packages. plural Motorola-branded Binatone Hubble The camera has a cryptographic strength vulnerability.Information may be obtained. Binatone Motorola-branded Camera is a Motorola brand product camera produced by Binatone authorized by Binatone",
"sources": [
{
"db": "NVD",
"id": "CVE-2021-3789"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-014941"
},
{
"db": "CNVD",
"id": "CNVD-2022-77540"
}
],
"trust": 2.16
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2021-3789",
"trust": 3.8
},
{
"db": "JVNDB",
"id": "JVNDB-2021-014941",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2022-77540",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202111-1174",
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-77540"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-014941"
},
{
"db": "CNNVD",
"id": "CNNVD-202111-1174"
},
{
"db": "NVD",
"id": "CVE-2021-3789"
}
]
},
"id": "VAR-202111-0513",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-77540"
}
],
"trust": 1.6
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"IoT"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-77540"
}
]
},
"last_update_date": "2024-11-23T22:44:08.602000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Binatone\u00a0Motorola-branded\u00a0Camera\u00a0Vulnerabilities",
"trust": 0.8,
"url": "https://binatoneglobal.com/security-advisory/"
},
{
"title": "Patch for Binatone Motorola-branded Camera Information Disclosure Vulnerability (CNVD-2022-77540)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/360881"
},
{
"title": "Binatone Motorola-branded Camera Fixes for encryption problem vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=170332"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-77540"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-014941"
},
{
"db": "CNNVD",
"id": "CNNVD-202111-1174"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-326",
"trust": 1.0
},
{
"problemtype": "CWE-522",
"trust": 1.0
},
{
"problemtype": "Inappropriate cryptographic strength (CWE-326) [NVD evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2021-014941"
},
{
"db": "NVD",
"id": "CVE-2021-3789"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.2,
"url": "https://binatoneglobal.com/security-advisory/"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-3789"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-77540"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-014941"
},
{
"db": "CNNVD",
"id": "CNNVD-202111-1174"
},
{
"db": "NVD",
"id": "CVE-2021-3789"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2022-77540"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-014941"
},
{
"db": "CNNVD",
"id": "CNNVD-202111-1174"
},
{
"db": "NVD",
"id": "CVE-2021-3789"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2022-11-16T00:00:00",
"db": "CNVD",
"id": "CNVD-2022-77540"
},
{
"date": "2022-11-02T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2021-014941"
},
{
"date": "2021-11-12T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202111-1174"
},
{
"date": "2021-11-12T22:15:08.267000",
"db": "NVD",
"id": "CVE-2021-3789"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2022-11-16T00:00:00",
"db": "CNVD",
"id": "CNVD-2022-77540"
},
{
"date": "2022-11-02T05:32:00",
"db": "JVNDB",
"id": "JVNDB-2021-014941"
},
{
"date": "2022-07-01T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202111-1174"
},
{
"date": "2024-11-21T06:22:26.297000",
"db": "NVD",
"id": "CVE-2021-3789"
}
]
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural \u00a0Motorola-branded\u00a0Binatone\u00a0Hubble\u00a0 Vulnerability related to encryption strength in cameras",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2021-014941"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "encryption problem",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202111-1174"
}
],
"trust": 0.6
}
}
VAR-202111-0509
Vulnerability from variot - Updated: 2024-11-23 22:33An improper access control vulnerability was reported in some Motorola-branded Binatone Hubble Cameras which could allow an unauthenticated attacker on the same network as the device to access administrative pages that could result in information disclosure or device firmware update with verified firmware. plural Motorola-branded Binatone Hubble The camera has an unspecified vulnerability.Information may be obtained. Binatone Motorola-branded Camera is a Motorola-branded camera produced by Binatone authorized by Binatone
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202111-0509",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "cn28",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "cn75",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "mbp4855",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "cn50",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "mbp3667",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "connect view 65",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "focus 72r",
"scope": "lt",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": "03.40.00"
},
{
"model": "halo\\+ camera",
"scope": "lt",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": "03.50.14"
},
{
"model": "connect 20",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "lux 64",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "mbp3855",
"scope": "lt",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": "03.40.00"
},
{
"model": "lux 65",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "comfort 85 connect",
"scope": "lt",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": "03.40.02"
},
{
"model": "cn40",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "comfort 40",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "focus 68",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "comfort 50 connect",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "ease44",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "lux 85 connect",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "mbp669 connect",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "mbp6855",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "comfort 50 connect",
"scope": null,
"trust": 0.8,
"vendor": "binatone global",
"version": null
},
{
"model": "comfort 40",
"scope": null,
"trust": 0.8,
"vendor": "binatone global",
"version": null
},
{
"model": "cn28",
"scope": null,
"trust": 0.8,
"vendor": "binatone global",
"version": null
},
{
"model": "cn50",
"scope": null,
"trust": 0.8,
"vendor": "binatone global",
"version": null
},
{
"model": "mbp3855",
"scope": null,
"trust": 0.8,
"vendor": "binatone global",
"version": null
},
{
"model": "halo+ \u30ab\u30e1\u30e9",
"scope": null,
"trust": 0.8,
"vendor": "binatone global",
"version": null
},
{
"model": "mbp4855",
"scope": null,
"trust": 0.8,
"vendor": "binatone global",
"version": null
},
{
"model": "focus 72r",
"scope": null,
"trust": 0.8,
"vendor": "binatone global",
"version": null
},
{
"model": "comfort 85 connect",
"scope": null,
"trust": 0.8,
"vendor": "binatone global",
"version": null
},
{
"model": "focus 68",
"scope": null,
"trust": 0.8,
"vendor": "binatone global",
"version": null
},
{
"model": "motorola-branded camera",
"scope": null,
"trust": 0.6,
"vendor": "binatone",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-77543"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-014945"
},
{
"db": "NVD",
"id": "CVE-2021-3793"
}
]
},
"cve": "CVE-2021-3793",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2021-3793",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2022-77543",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"exploitabilityScore": 3.9,
"id": "CVE-2021-3793",
"impactScore": 1.4,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "psirt@lenovo.com",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"exploitabilityScore": 3.9,
"id": "CVE-2021-3793",
"impactScore": 2.5,
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 5.3,
"baseSeverity": "Medium",
"confidentialityImpact": "Low",
"exploitabilityScore": null,
"id": "CVE-2021-3793",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2021-3793",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "psirt@lenovo.com",
"id": "CVE-2021-3793",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2021-3793",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2022-77543",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-202111-1180",
"trust": 0.6,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-77543"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-014945"
},
{
"db": "CNNVD",
"id": "CNNVD-202111-1180"
},
{
"db": "NVD",
"id": "CVE-2021-3793"
},
{
"db": "NVD",
"id": "CVE-2021-3793"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "An improper access control vulnerability was reported in some Motorola-branded Binatone Hubble Cameras which could allow an unauthenticated attacker on the same network as the device to access administrative pages that could result in information disclosure or device firmware update with verified firmware. plural Motorola-branded Binatone Hubble The camera has an unspecified vulnerability.Information may be obtained. Binatone Motorola-branded Camera is a Motorola-branded camera produced by Binatone authorized by Binatone",
"sources": [
{
"db": "NVD",
"id": "CVE-2021-3793"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-014945"
},
{
"db": "CNVD",
"id": "CNVD-2022-77543"
}
],
"trust": 2.16
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2021-3793",
"trust": 3.8
},
{
"db": "JVNDB",
"id": "JVNDB-2021-014945",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2022-77543",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202111-1180",
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-77543"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-014945"
},
{
"db": "CNNVD",
"id": "CNNVD-202111-1180"
},
{
"db": "NVD",
"id": "CVE-2021-3793"
}
]
},
"id": "VAR-202111-0509",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-77543"
}
],
"trust": 1.6
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"IoT"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-77543"
}
]
},
"last_update_date": "2024-11-23T22:33:00.255000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Binatone\u00a0Motorola-branded\u00a0Camera\u00a0Vulnerabilities",
"trust": 0.8,
"url": "https://binatoneglobal.com/security-advisory/"
},
{
"title": "Patch for Binatone Motorola-branded Camera Access Control Error Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/360866"
},
{
"title": "Binatone Motorola-branded Camera Security vulnerabilities",
"trust": 0.6,
"url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=170337"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-77543"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-014945"
},
{
"db": "CNNVD",
"id": "CNNVD-202111-1180"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-Other",
"trust": 1.0
},
{
"problemtype": "CWE-424",
"trust": 1.0
},
{
"problemtype": "others (CWE-Other) [NVD evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2021-014945"
},
{
"db": "NVD",
"id": "CVE-2021-3793"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.2,
"url": "https://binatoneglobal.com/security-advisory/"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-3793"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-77543"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-014945"
},
{
"db": "CNNVD",
"id": "CNNVD-202111-1180"
},
{
"db": "NVD",
"id": "CVE-2021-3793"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2022-77543"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-014945"
},
{
"db": "CNNVD",
"id": "CNNVD-202111-1180"
},
{
"db": "NVD",
"id": "CVE-2021-3793"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2022-11-16T00:00:00",
"db": "CNVD",
"id": "CNVD-2022-77543"
},
{
"date": "2022-11-02T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2021-014945"
},
{
"date": "2021-11-12T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202111-1180"
},
{
"date": "2021-11-12T22:15:08.473000",
"db": "NVD",
"id": "CVE-2021-3793"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2022-11-16T00:00:00",
"db": "CNVD",
"id": "CNVD-2022-77543"
},
{
"date": "2022-11-02T05:33:00",
"db": "JVNDB",
"id": "JVNDB-2021-014945"
},
{
"date": "2022-10-28T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202111-1180"
},
{
"date": "2024-11-21T06:22:27",
"db": "NVD",
"id": "CVE-2021-3793"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202111-1180"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural \u00a0Motorola-branded\u00a0Binatone\u00a0Hubble\u00a0 Vulnerability in camera",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2021-014945"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "other",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202111-1180"
}
],
"trust": 0.6
}
}
VAR-202111-0510
Vulnerability from variot - Updated: 2024-11-23 22:29Some device communications in some Motorola-branded Binatone Hubble Cameras with backend Hubble services are not encrypted which could lead to the communication channel being accessible by an attacker. plural Motorola-branded Binatone Hubble Cameras contain a vulnerability related to sending sensitive information in plaintext.Information may be obtained. Binatone Motorola-branded Camera is a Motorola brand product camera authorized by Binatone Company
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202111-0510",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "cn28",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "cn75",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "mbp4855",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "cn50",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "mbp3667",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "connect view 65",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "focus 72r",
"scope": "lt",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": "03.40.00"
},
{
"model": "halo\\+ camera",
"scope": "lt",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": "03.50.14"
},
{
"model": "connect 20",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "lux 64",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "mbp3855",
"scope": "lt",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": "03.40.00"
},
{
"model": "lux 65",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "comfort 85 connect",
"scope": "lt",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": "03.40.02"
},
{
"model": "cn40",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "comfort 40",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "focus 68",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "comfort 50 connect",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "ease44",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "lux 85 connect",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "mbp669 connect",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "mbp6855",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "comfort 50 connect",
"scope": null,
"trust": 0.8,
"vendor": "binatone global",
"version": null
},
{
"model": "comfort 40",
"scope": null,
"trust": 0.8,
"vendor": "binatone global",
"version": null
},
{
"model": "cn28",
"scope": null,
"trust": 0.8,
"vendor": "binatone global",
"version": null
},
{
"model": "cn50",
"scope": null,
"trust": 0.8,
"vendor": "binatone global",
"version": null
},
{
"model": "mbp3855",
"scope": null,
"trust": 0.8,
"vendor": "binatone global",
"version": null
},
{
"model": "halo+ \u30ab\u30e1\u30e9",
"scope": null,
"trust": 0.8,
"vendor": "binatone global",
"version": null
},
{
"model": "mbp4855",
"scope": null,
"trust": 0.8,
"vendor": "binatone global",
"version": null
},
{
"model": "focus 72r",
"scope": null,
"trust": 0.8,
"vendor": "binatone global",
"version": null
},
{
"model": "comfort 85 connect",
"scope": null,
"trust": 0.8,
"vendor": "binatone global",
"version": null
},
{
"model": "focus 68",
"scope": null,
"trust": 0.8,
"vendor": "binatone global",
"version": null
},
{
"model": "motorola-branded camera",
"scope": null,
"trust": 0.6,
"vendor": "binatone",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-77544"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-014944"
},
{
"db": "NVD",
"id": "CVE-2021-3792"
}
]
},
"cve": "CVE-2021-3792",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2021-3792",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2022-77544",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"exploitabilityScore": 3.9,
"id": "CVE-2021-3792",
"impactScore": 1.4,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 2.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "OTHER",
"availabilityImpact": "None",
"baseScore": 5.3,
"baseSeverity": "Medium",
"confidentialityImpact": "Low",
"exploitabilityScore": null,
"id": "JVNDB-2021-014944",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2021-3792",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "psirt@lenovo.com",
"id": "CVE-2021-3792",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2021-3792",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2022-77544",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-202111-1178",
"trust": 0.6,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-77544"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-014944"
},
{
"db": "CNNVD",
"id": "CNNVD-202111-1178"
},
{
"db": "NVD",
"id": "CVE-2021-3792"
},
{
"db": "NVD",
"id": "CVE-2021-3792"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Some device communications in some Motorola-branded Binatone Hubble Cameras with backend Hubble services are not encrypted which could lead to the communication channel being accessible by an attacker. plural Motorola-branded Binatone Hubble Cameras contain a vulnerability related to sending sensitive information in plaintext.Information may be obtained. Binatone Motorola-branded Camera is a Motorola brand product camera authorized by Binatone Company",
"sources": [
{
"db": "NVD",
"id": "CVE-2021-3792"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-014944"
},
{
"db": "CNVD",
"id": "CNVD-2022-77544"
}
],
"trust": 2.16
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2021-3792",
"trust": 3.8
},
{
"db": "JVNDB",
"id": "JVNDB-2021-014944",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2022-77544",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202111-1178",
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-77544"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-014944"
},
{
"db": "CNNVD",
"id": "CNNVD-202111-1178"
},
{
"db": "NVD",
"id": "CVE-2021-3792"
}
]
},
"id": "VAR-202111-0510",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-77544"
}
],
"trust": 1.6
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"IoT"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-77544"
}
]
},
"last_update_date": "2024-11-23T22:29:11.429000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Binatone\u00a0Motorola-branded\u00a0Camera\u00a0Vulnerabilities",
"trust": 0.8,
"url": "https://binatoneglobal.com/security-advisory/"
},
{
"title": "Patch for Binatone Motorola-branded Camera Has Unspecified Vulnerabilities",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/360861"
},
{
"title": "Binatone Motorola-branded Camera Security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=170335"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-77544"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-014944"
},
{
"db": "CNNVD",
"id": "CNNVD-202111-1178"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-319",
"trust": 1.0
},
{
"problemtype": "Sending important information in clear text (CWE-319) [NVD evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2021-014944"
},
{
"db": "NVD",
"id": "CVE-2021-3792"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.2,
"url": "https://binatoneglobal.com/security-advisory/"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-3792"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-77544"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-014944"
},
{
"db": "CNNVD",
"id": "CNNVD-202111-1178"
},
{
"db": "NVD",
"id": "CVE-2021-3792"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2022-77544"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-014944"
},
{
"db": "CNNVD",
"id": "CNNVD-202111-1178"
},
{
"db": "NVD",
"id": "CVE-2021-3792"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2022-11-16T00:00:00",
"db": "CNVD",
"id": "CNVD-2022-77544"
},
{
"date": "2022-11-02T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2021-014944"
},
{
"date": "2021-11-12T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202111-1178"
},
{
"date": "2021-11-12T22:15:08.420000",
"db": "NVD",
"id": "CVE-2021-3792"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2022-11-16T00:00:00",
"db": "CNVD",
"id": "CNVD-2022-77544"
},
{
"date": "2022-11-02T05:32:00",
"db": "JVNDB",
"id": "JVNDB-2021-014944"
},
{
"date": "2022-07-01T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202111-1178"
},
{
"date": "2024-11-21T06:22:26.823000",
"db": "NVD",
"id": "CVE-2021-3792"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202111-1178"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural \u00a0Motorola-branded\u00a0Binatone\u00a0Hubble\u00a0 Vulnerability related to transmission of important information in plain text in camera",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2021-014944"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "other",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202111-1178"
}
],
"trust": 0.6
}
}
VAR-202111-0511
Vulnerability from variot - Updated: 2024-11-23 21:58An information disclosure vulnerability was reported in some Motorola-branded Binatone Hubble Cameras that could allow an unauthenticated attacker on the same subnet to download an encrypted log file containing sensitive information such as WiFi SSID and password. Binatone Motorola-branded Camera is a Motorola brand product camera authorized by Binatone Company
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202111-0511",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "cn28",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "cn75",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "mbp4855",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "cn50",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "mbp3667",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "connect view 65",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "focus 72r",
"scope": "lt",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": "03.40.00"
},
{
"model": "halo\\+ camera",
"scope": "lt",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": "03.50.14"
},
{
"model": "connect 20",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "lux 64",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "mbp3855",
"scope": "lt",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": "03.40.00"
},
{
"model": "lux 65",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "comfort 85 connect",
"scope": "lt",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": "03.40.02"
},
{
"model": "cn40",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "comfort 40",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "focus 68",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "comfort 50 connect",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "ease44",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "lux 85 connect",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "mbp669 connect",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "mbp6855",
"scope": "eq",
"trust": 1.0,
"vendor": "binatoneglobal",
"version": null
},
{
"model": "comfort 50 connect",
"scope": null,
"trust": 0.8,
"vendor": "binatone global",
"version": null
},
{
"model": "comfort 40",
"scope": null,
"trust": 0.8,
"vendor": "binatone global",
"version": null
},
{
"model": "cn28",
"scope": null,
"trust": 0.8,
"vendor": "binatone global",
"version": null
},
{
"model": "cn50",
"scope": null,
"trust": 0.8,
"vendor": "binatone global",
"version": null
},
{
"model": "mbp3855",
"scope": null,
"trust": 0.8,
"vendor": "binatone global",
"version": null
},
{
"model": "halo+ \u30ab\u30e1\u30e9",
"scope": null,
"trust": 0.8,
"vendor": "binatone global",
"version": null
},
{
"model": "mbp4855",
"scope": null,
"trust": 0.8,
"vendor": "binatone global",
"version": null
},
{
"model": "focus 72r",
"scope": null,
"trust": 0.8,
"vendor": "binatone global",
"version": null
},
{
"model": "comfort 85 connect",
"scope": null,
"trust": 0.8,
"vendor": "binatone global",
"version": null
},
{
"model": "focus 68",
"scope": null,
"trust": 0.8,
"vendor": "binatone global",
"version": null
},
{
"model": "motorola-branded camera",
"scope": null,
"trust": 0.6,
"vendor": "binatone",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-77542"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-014943"
},
{
"db": "NVD",
"id": "CVE-2021-3791"
}
]
},
"cve": "CVE-2021-3791",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 6.5,
"id": "CVE-2021-3791",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "LOW",
"trust": 1.8,
"vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 6.5,
"id": "CNVD-2022-77542",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "LOW",
"trust": 0.6,
"vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "ADJACENT",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.8,
"id": "CVE-2021-3791",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 2.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Adjacent Network",
"author": "OTHER",
"availabilityImpact": "None",
"baseScore": 6.5,
"baseSeverity": "Medium",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "JVNDB-2021-014943",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2021-3791",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "psirt@lenovo.com",
"id": "CVE-2021-3791",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2021-3791",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2022-77542",
"trust": 0.6,
"value": "LOW"
},
{
"author": "CNNVD",
"id": "CNNVD-202111-1177",
"trust": 0.6,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-77542"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-014943"
},
{
"db": "CNNVD",
"id": "CNNVD-202111-1177"
},
{
"db": "NVD",
"id": "CVE-2021-3791"
},
{
"db": "NVD",
"id": "CVE-2021-3791"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "An information disclosure vulnerability was reported in some Motorola-branded Binatone Hubble Cameras that could allow an unauthenticated attacker on the same subnet to download an encrypted log file containing sensitive information such as WiFi SSID and password. Binatone Motorola-branded Camera is a Motorola brand product camera authorized by Binatone Company",
"sources": [
{
"db": "NVD",
"id": "CVE-2021-3791"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-014943"
},
{
"db": "CNVD",
"id": "CNVD-2022-77542"
}
],
"trust": 2.16
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2021-3791",
"trust": 3.8
},
{
"db": "JVNDB",
"id": "JVNDB-2021-014943",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2022-77542",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202111-1177",
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-77542"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-014943"
},
{
"db": "CNNVD",
"id": "CNNVD-202111-1177"
},
{
"db": "NVD",
"id": "CVE-2021-3791"
}
]
},
"id": "VAR-202111-0511",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-77542"
}
],
"trust": 1.6
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"IoT"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-77542"
}
]
},
"last_update_date": "2024-11-23T21:58:39.059000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Binatone\u00a0Motorola-branded\u00a0Camera\u00a0Vulnerabilities",
"trust": 0.8,
"url": "https://binatoneglobal.com/security-advisory/"
},
{
"title": "Patch for Binatone Motorola-branded Camera Information Disclosure Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/360871"
},
{
"title": "Binatone Motorola-branded Camera Repair measures for log information disclosure vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=170334"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-77542"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-014943"
},
{
"db": "CNNVD",
"id": "CNNVD-202111-1177"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-532",
"trust": 1.0
},
{
"problemtype": "Information leakage from log files (CWE-532) [ others ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2021-014943"
},
{
"db": "NVD",
"id": "CVE-2021-3791"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.2,
"url": "https://binatoneglobal.com/security-advisory/"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-3791"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2022-77542"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-014943"
},
{
"db": "CNNVD",
"id": "CNNVD-202111-1177"
},
{
"db": "NVD",
"id": "CVE-2021-3791"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2022-77542"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-014943"
},
{
"db": "CNNVD",
"id": "CNNVD-202111-1177"
},
{
"db": "NVD",
"id": "CVE-2021-3791"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2022-11-16T00:00:00",
"db": "CNVD",
"id": "CNVD-2022-77542"
},
{
"date": "2022-11-02T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2021-014943"
},
{
"date": "2021-11-12T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202111-1177"
},
{
"date": "2021-11-12T22:15:08.367000",
"db": "NVD",
"id": "CVE-2021-3791"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2022-11-16T00:00:00",
"db": "CNVD",
"id": "CNVD-2022-77542"
},
{
"date": "2022-11-02T05:32:00",
"db": "JVNDB",
"id": "JVNDB-2021-014943"
},
{
"date": "2022-07-01T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202111-1177"
},
{
"date": "2024-11-21T06:22:26.647000",
"db": "NVD",
"id": "CVE-2021-3791"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote or local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202111-1177"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural \u00a0Motorola-branded\u00a0Binatone\u00a0Hubble\u00a0 Vulnerability related to information leakage from log files in cameras",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2021-014943"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "log information leak",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202111-1177"
}
],
"trust": 0.6
}
}