FKIE_CVE-2019-3949
Vulnerability from fkie_nvd - Published: 2019-07-09 18:15 - Updated: 2024-11-21 04:42
Severity ?
Summary
Arlo Basestation firmware 1.12.0.1_27940 and prior firmware contain a networking misconfiguration that allows access to restricted network interfaces. This could allow an attacker to upload or download arbitrary files and possibly execute malicious code on the device.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| arlo | vmb3010_firmware | * | |
| arlo | vmb3010 | - | |
| arlo | vmb4000_firmware | * | |
| arlo | vmb4000 | - | |
| arlo | vmb3500_firmware | * | |
| arlo | vmb3500 | - | |
| arlo | vmb4500_firmware | * | |
| arlo | vmb4500 | - | |
| arlo | vmb5000_firmware | * | |
| arlo | vmb5000 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:arlo:vmb3010_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "64A7DF98-4FD5-4A09-AEF1-E4D9F7D48B7D",
"versionEndExcluding": "1.12.2.3_2762",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:arlo:vmb3010:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E3750739-BEBE-40A8-8BA5-D3CB79064263",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:arlo:vmb4000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5D74D819-C51C-4AF0-A644-36F831B75AD6",
"versionEndExcluding": "1.12.2.3_2762",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:arlo:vmb4000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "49AB1BD0-56AE-41C6-BCC6-5CFECC0F313C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:arlo:vmb3500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "00403FFE-61F7-4F5A-8389-8C44E1B353C9",
"versionEndExcluding": "1.12.2.4_2773",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:arlo:vmb3500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C8C9EC35-3512-4E82-B3C2-34EE7CC77EB4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:arlo:vmb4500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4CBA42FC-FC70-41FD-9EFF-8320F59B0BE7",
"versionEndExcluding": "1.12.2.4_2773",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:arlo:vmb4500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0BB085BD-CDC9-41A1-B82D-A57965BC7C2C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:arlo:vmb5000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ADC590BD-092E-475C-B64D-68BE7F9E1312",
"versionEndExcluding": "1.12.2.2_2824",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:arlo:vmb5000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A648C2AB-F4E1-46B9-9F05-626BC739E508",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Arlo Basestation firmware 1.12.0.1_27940 and prior firmware contain a networking misconfiguration that allows access to restricted network interfaces. This could allow an attacker to upload or download arbitrary files and possibly execute malicious code on the device."
},
{
"lang": "es",
"value": "Arlo Basestation firmware versi\u00f3n 1.12.0.1_27940 y anterior, contienen una configuraci\u00f3n inapropiada de la red que permite el acceso a las interfaces de red restringidas. Esto podr\u00eda permitir a un atacante cargar o descargar archivos arbitrarios y posiblemente ejecutar c\u00f3digo malicioso en el dispositivo."
}
],
"id": "CVE-2019-3949",
"lastModified": "2024-11-21T04:42:55.653",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-07-09T18:15:11.670",
"references": [
{
"source": "vulnreport@tenable.com",
"tags": [
"Vendor Advisory"
],
"url": "https://kb.arlo.com/000062274/Security-Advisory-for-Networking-Misconfiguration-and-Insufficient-UART-Protection-Mechanisms"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://kb.arlo.com/000062274/Security-Advisory-for-Networking-Misconfiguration-and-Insufficient-UART-Protection-Mechanisms"
}
],
"sourceIdentifier": "vulnreport@tenable.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-16"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…