VAR-201912-0678
Vulnerability from variot - Updated: 2024-11-23 22:05On Barco ClickShare Button R9861500D01 devices (before firmware version 1.9.0) JTAG access is disabled after ROM code execution. This means that JTAG access is possible when the system is running code from ROM before handing control over to embedded firmware. Barco ClickShare Button R9861500D01 The device contains an input validation vulnerability.Information may be obtained
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201912-0678",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "clickshare cs-100",
"scope": "lt",
"trust": 1.8,
"vendor": "barco",
"version": "1.9.0"
},
{
"model": "clickshare cse-200",
"scope": "lt",
"trust": 1.8,
"vendor": "barco",
"version": "1.9.0"
},
{
"model": "clickshare cse-800",
"scope": "lt",
"trust": 1.8,
"vendor": "barco",
"version": "1.9.0"
},
{
"model": "clickshare cse-200\\+",
"scope": "lt",
"trust": 1.0,
"vendor": "barco",
"version": "1.9.0"
},
{
"model": "clickshare cse-200+",
"scope": "lt",
"trust": 0.8,
"vendor": "barco",
"version": "1.9.0"
},
{
"model": "clickshare button r9861500d01",
"scope": "lt",
"trust": 0.6,
"vendor": "barco",
"version": "1.9.0"
},
{
"model": "clickshare cse-800",
"scope": "eq",
"trust": 0.6,
"vendor": "barco",
"version": "1.8.2.2"
},
{
"model": "clickshare cse-800",
"scope": "eq",
"trust": 0.6,
"vendor": "barco",
"version": "1.6.1.2"
},
{
"model": "clickshare cse-800",
"scope": "eq",
"trust": 0.6,
"vendor": "barco",
"version": "1.7.0.22"
},
{
"model": "clickshare cse-800",
"scope": "eq",
"trust": 0.6,
"vendor": "barco",
"version": "1.5.0.12"
},
{
"model": "clickshare cse-800",
"scope": "eq",
"trust": 0.6,
"vendor": "barco",
"version": "1.5.2.3"
},
{
"model": "clickshare cse-800",
"scope": "eq",
"trust": 0.6,
"vendor": "barco",
"version": null
},
{
"model": "clickshare cse-800",
"scope": "eq",
"trust": 0.6,
"vendor": "barco",
"version": "1.6.4.4"
},
{
"model": "clickshare cse-800",
"scope": "eq",
"trust": 0.6,
"vendor": "barco",
"version": "1.5.1.2"
},
{
"model": "clickshare cse-800",
"scope": "eq",
"trust": 0.6,
"vendor": "barco",
"version": "1.7.1.1"
},
{
"model": "clickshare cse-800",
"scope": "eq",
"trust": 0.6,
"vendor": "barco",
"version": "1.6.2.7"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-46445"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-013804"
},
{
"db": "CNNVD",
"id": "CNNVD-201912-728"
},
{
"db": "NVD",
"id": "CVE-2019-18827"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:barco:clickshare_cs-100_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:barco:clickshare_cse-200_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:barco:clickshare_cse-200%2b_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:barco:clickshare_cse-800_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-013804"
}
]
},
"cve": "CVE-2019-18827",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2019-18827",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2019-46445",
"impactScore": 4.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.2,
"id": "CVE-2019-18827",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
{
"attackComplexity": "High",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 5.9,
"baseSeverity": "Medium",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2019-18827",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2019-18827",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2019-18827",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2019-46445",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201912-728",
"trust": 0.6,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-46445"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-013804"
},
{
"db": "CNNVD",
"id": "CNNVD-201912-728"
},
{
"db": "NVD",
"id": "CVE-2019-18827"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "On Barco ClickShare Button R9861500D01 devices (before firmware version 1.9.0) JTAG access is disabled after ROM code execution. This means that JTAG access is possible when the system is running code from ROM before handing control over to embedded firmware. Barco ClickShare Button R9861500D01 The device contains an input validation vulnerability.Information may be obtained",
"sources": [
{
"db": "NVD",
"id": "CVE-2019-18827"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-013804"
},
{
"db": "CNVD",
"id": "CNVD-2019-46445"
}
],
"trust": 2.16
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2019-18827",
"trust": 3.0
},
{
"db": "JVNDB",
"id": "JVNDB-2019-013804",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2019-46445",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-201912-728",
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-46445"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-013804"
},
{
"db": "CNNVD",
"id": "CNNVD-201912-728"
},
{
"db": "NVD",
"id": "CVE-2019-18827"
}
]
},
"id": "VAR-201912-0678",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-46445"
}
],
"trust": 1.3368421000000001
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-46445"
}
]
},
"last_update_date": "2024-11-23T22:05:55.919000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Update your ClickShare device",
"trust": 0.8,
"url": "https://www.barco.com/en/clickshare/firmware-update"
},
{
"title": "ClickShare CS-100 base unit firmware v1.9.1.7",
"trust": 0.8,
"url": "https://www.barco.com/en/support/software/R33050069?majorVersion=01\u0026minorVersion=09\u0026patchVersion=01\u0026buildVersion=007"
},
{
"title": "ClickShare CSE-200 base unit firmware v1.9.1.7",
"trust": 0.8,
"url": "https://www.barco.com/en/support/software/R33050070?majorVersion=01\u0026minorVersion=09\u0026patchVersion=01\u0026buildVersion=007"
},
{
"title": "ClickShare CSE-800 base unit firmware v1.9.1.7",
"trust": 0.8,
"url": "https://www.barco.com/en/support/software/R33050095?majorVersion=01\u0026minorVersion=09\u0026patchVersion=01\u0026buildVersion=007"
},
{
"title": "ClickShare CSE-200+ base unit firmware v1.9.1.7",
"trust": 0.8,
"url": "https://www.barco.com/en/support/software/R33050125?majorVersion=01\u0026minorVersion=09\u0026patchVersion=01\u0026buildVersion=007"
},
{
"title": "Patch for Barco ClickShare Button R9861500D01 has an unknown vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/194993"
},
{
"title": "Barco ClickShare Button R9861500D01 Enter the fix for the verification error vulnerability",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=105993"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-46445"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-013804"
},
{
"db": "CNNVD",
"id": "CNNVD-201912-728"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-362",
"trust": 1.0
},
{
"problemtype": "CWE-285",
"trust": 1.0
},
{
"problemtype": "CWE-20",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-013804"
},
{
"db": "NVD",
"id": "CVE-2019-18827"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.2,
"url": "https://www.barco.com/en/clickshare/firmware-update"
},
{
"trust": 2.2,
"url": "https://www.barco.com/en/support/software/r33050070?majorversion=01\u0026minorversion=09\u0026patchversion=01\u0026buildversion=007"
},
{
"trust": 2.0,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-18827"
},
{
"trust": 1.6,
"url": "https://labs.f-secure.com/advisories/multiple-vulnerabilities-in-barco-clickshare/"
},
{
"trust": 1.6,
"url": "https://www.barco.com/en/support/software/r33050125?majorversion=01\u0026minorversion=09\u0026patchversion=01\u0026buildversion=007"
},
{
"trust": 1.6,
"url": "https://www.barco.com/en/support/software/r33050069?majorversion=01\u0026minorversion=09\u0026patchversion=01\u0026buildversion=007"
},
{
"trust": 1.6,
"url": "https://www.barco.com/en/support/software/r33050095?majorversion=01\u0026minorversion=09\u0026patchversion=01\u0026buildversion=007"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-18827"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-46445"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-013804"
},
{
"db": "CNNVD",
"id": "CNNVD-201912-728"
},
{
"db": "NVD",
"id": "CVE-2019-18827"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2019-46445"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-013804"
},
{
"db": "CNNVD",
"id": "CNNVD-201912-728"
},
{
"db": "NVD",
"id": "CVE-2019-18827"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-12-23T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-46445"
},
{
"date": "2020-01-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-013804"
},
{
"date": "2019-12-16T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201912-728"
},
{
"date": "2019-12-16T17:15:11.957000",
"db": "NVD",
"id": "CVE-2019-18827"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-12-23T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-46445"
},
{
"date": "2020-01-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-013804"
},
{
"date": "2019-12-30T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201912-728"
},
{
"date": "2024-11-21T04:33:39.447000",
"db": "NVD",
"id": "CVE-2019-18827"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201912-728"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Barco ClickShare Button R9861500D01 Vulnerability related to input validation on devices",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-013804"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "input validation error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201912-728"
}
],
"trust": 0.6
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…