Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:samsung:samsung_mobile:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "08E4422C-42D0-47CA-A8B7-0DFF0652363E", "vulnerable": true}, {"criteria": "cpe:2.3:o:samsung:samsung_mobile:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "088A46CD-DA84-4DFA-ABCB-95E6D82DCE15", "vulnerable": true}, {"criteria": "cpe:2.3:o:samsung:samsung_mobile:7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "2F08AFFF-8310-4CCE-97A1-872CAA97E26D", "vulnerable": true}, {"criteria": "cpe:2.3:o:samsung:samsung_mobile:7.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "CC76BE55-8569-4C11-BDF7-DB9AD2783313", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "On Samsung mobile devices with N(7.x) software and Exynos chipsets, attackers can conduct a Trustlet stack overflow attack for arbitrary TEE code execution, in conjunction with a brute-force attack to discover unlock information (PIN, password, or pattern). The Samsung ID is SVE-2017-10733."}, {"lang": "es", "value": "En dispositivos m\u00f3viles Samsung con software N (7.x) y chipsets Exynos, los atacantes pueden realizar un ataque de desbordamiento de pila Trustlet para ejecutar c\u00f3digo TEE arbitrario junto con un ataque de fuerza bruta para descubrir informaci\u00f3n de desbloqueo (PIN, contrase\u00f1a o patr\u00f3n). El ID de Samsung es SVE-2017-10733."}], "id": "CVE-2018-5210", "lastModified": "2024-11-21T04:08:20.440", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0"}, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2018-01-04T06:29:00.497", "references": [{"source": "cve@mitre.org", "tags": ["Issue Tracking", "Vendor Advisory"], "url": "https://security.samsungmobile.com/securityUpdate.smsb"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Issue Tracking", "Vendor Advisory"], "url": "https://security.samsungmobile.com/securityUpdate.smsb"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-787"}], "source": "nvd@nist.gov", "type": "Primary"}]}