Vulnerability CVE-2017-12095


Published: 2018-04-05

Description:
An exploitable vulnerability exists in the WiFi Access Point feature of Circle with Disney running firmware 2.0.1. A series of WiFi packets can force Circle to setup an Access Point with default credentials. An attacker needs to send a series of spoofed "de-auth" packets to trigger this vulnerability.

Type:

CWE-290

(Authentication Bypass by Spoofing)

CVSS2 => (AV:A/AC:L/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
3.3/10
2.9/10
6.5/10
Exploit range
Attack complexity
Authentication
Adjacent network
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
Meetcircle -> Circle with disney firmware 

 References:
https://talosintelligence.com/vulnerability_reports/TALOS-2017-0447

Copyright 2024, cxsecurity.com

 

Back to Top