FKIE_CVE-2024-44097
Vulnerability from fkie_nvd - Published: 2024-10-02 14:15 - Updated: 2025-07-24 15:58
Severity ?
Summary
According to the researcher: "The TLS connections are encrypted against tampering or eavesdropping. However, the application does not validate the server certificate properly while initializing the TLS connection. This allows for a network attacker to intercept the connection and read the data. The attacker could the either send the client a malicious response, or forward the (possibly modified) data to the real server."
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:google:nest_doorbell_\\(battery\\)_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "64755C4C-152D-42E0-B8A6-85F8D3E12A49",
"versionEndExcluding": "1.73c",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:google:nest_doorbell_\\(battery\\):-:*:*:*:*:*:*:*",
"matchCriteriaId": "67E0B797-6C44-4E64-A5B3-D01CB6C649C3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:google:nest_cam_\\(outdoor_or_indoor\\,_battery\\)_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "94CCE5CC-CE98-4678-B310-DE4E2135A0AA",
"versionEndExcluding": "1.73c",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:google:nest_cam_\\(outdoor_or_indoor\\,_battery\\):-:*:*:*:*:*:*:*",
"matchCriteriaId": "49D395E2-8922-4083-BD14-8D2E6C5F4DA4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:google:nest_cam_with_floodlight_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2A122FAE-6A71-4B97-8F50-4B0BFB2ABBF2",
"versionEndExcluding": "1.73c",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:google:nest_cam_with_floodlight:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9C64A31C-3CBC-42EF-B99B-51F5F3EDDE13",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:google:nest_cam_\\(indoor\\,_wired\\)_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9FA68A08-3C16-47C5-B37A-30510891CE5E",
"versionEndExcluding": "1.73c",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:google:nest_cam_\\(indoor\\,_wired\\):-:*:*:*:*:*:*:*",
"matchCriteriaId": "CCBD77DA-4B12-4558-86A8-ADEC458221CF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "According to the researcher: \"The TLS connections are encrypted against tampering or eavesdropping. However, the application does not validate the server certificate properly while initializing the TLS connection. This allows for a network attacker to intercept the connection and read the data. The attacker could the either send the client a malicious response, or forward the (possibly modified) data to the real server.\""
},
{
"lang": "es",
"value": "Seg\u00fan el investigador: \"Las conexiones TLS est\u00e1n cifradas para evitar manipulaciones o escuchas no autorizadas. Sin embargo, la aplicaci\u00f3n no valida correctamente el certificado del servidor al inicializar la conexi\u00f3n TLS. Esto permite que un atacante de la red intercepte la conexi\u00f3n y lea los datos. El atacante podr\u00eda enviar al cliente una respuesta maliciosa o reenviar los datos (posiblemente modificados) al servidor real\"."
}
],
"id": "CVE-2024-44097",
"lastModified": "2025-07-24T15:58:43.047",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2024-10-02T14:15:05.670",
"references": [
{
"source": "dsap-vuln-management@google.com",
"tags": [
"Vendor Advisory"
],
"url": "https://support.google.com/product-documentation/answer/14950962?sjid=9489879942601373169-NA"
}
],
"sourceIdentifier": "dsap-vuln-management@google.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-269"
}
],
"source": "dsap-vuln-management@google.com",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…