Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:samsung:samsungdive:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A2FC077-4D6C-4342-9B7F-FE2AC47F736A", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:samsung:galaxy_note_2:-:*:*:*:*:*:*:*", "matchCriteriaId": "C11A19CD-FAFE-45ED-A24C-72642C3ED565", "vulnerable": false}, {"criteria": "cpe:2.3:h:samsung:galaxy_s:-:*:*:*:*:*:*:*", "matchCriteriaId": "A60CAD7B-6A6C-4627-B999-AA442F210486", "vulnerable": false}, {"criteria": "cpe:2.3:h:samsung:galaxy_s2:-:*:*:*:*:*:*:*", "matchCriteriaId": "27B05798-6E5E-4DCD-810E-680DEB3BDE97", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "cveTags": [], "descriptions": [{"lang": "en", "value": "The Track My Mobile feature in the SamsungDive subsystem for Android on Samsung Galaxy devices does not properly implement Location APIs, which allows physically proximate attackers to provide arbitrary location data via a \"commonly available simple GPS location spoofer.\""}, {"lang": "es", "value": "La funci\u00f3n \"Track My Mobile\" en el subsistema SamsungDive para Android en los dispositivos Samsung Galaxy no implementa correctamente las APIs de localizaci\u00f3n, lo que permite a atacantes f\u00edsicamente pr\u00f3ximos proporcionar datos de localizaci\u00f3n de su elecci\u00f3n a trav\u00e9s de un \"sencillo spoofer de localizaci\u00f3n GPS com\u00fanmente disponible.\"\r\n"}], "id": "CVE-2012-6334", "lastModified": "2025-04-11T00:51:21.963", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "LOW", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.9, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 5.5, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2012-12-31T11:50:28.047", "references": [{"source": "cve@mitre.org", "url": "http://thehackernews.com/2012/12/manufacture-based-gps-tracking-services.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://thehackernews.com/2012/12/manufacture-based-gps-tracking-services.html"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-264"}], "source": "nvd@nist.gov", "type": "Primary"}]}