Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:samsung:samsung_keyboard:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF1C9578-2FA5-45E7-84C4-7D00AB0B13C4", "versionEndExcluding": "5.3.70.1", "vulnerable": true}, {"criteria": "cpe:2.3:a:samsung:samsung_keyboard:*:*:*:*:*:*:*:*", "matchCriteriaId": "590537E6-3C33-4A36-B2DA-D15DD9577EDE", "versionEndExcluding": "5.4.60.49", "versionStartIncluding": "5.4.60.0", "vulnerable": true}, {"criteria": "cpe:2.3:a:samsung:samsung_keyboard:*:*:*:*:*:*:*:*", "matchCriteriaId": "6BAA17C0-045C-4864-BF1E-05234B8CC3EE", "versionEndExcluding": "5.4.85.5", "versionStartIncluding": "5.4.85.0", "vulnerable": true}, {"criteria": "cpe:2.3:a:samsung:samsung_keyboard:*:*:*:*:*:*:*:*", "matchCriteriaId": "54AE42D4-0B71-4E83-89E9-CD42D7FA381C", "versionEndExcluding": "5.5.00.58", "versionStartIncluding": "5.5.00.0", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:samsung:samsung_keyboard:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF1C9578-2FA5-45E7-84C4-7D00AB0B13C4", "versionEndExcluding": "5.3.70.1", "vulnerable": true}, {"criteria": "cpe:2.3:a:samsung:samsung_keyboard:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5096E6D-1D66-4C9E-BE44-0FBB9F594FBB", "versionEndExcluding": "5.6.00.52", "versionStartIncluding": "5.6.00.0", "vulnerable": true}, {"criteria": "cpe:2.3:a:samsung:samsung_keyboard:*:*:*:*:*:*:*:*", "matchCriteriaId": "6202106E-97BB-4735-828D-28AA1C443408", "versionEndExcluding": "5.6.10.42", "versionStartIncluding": "5.6.10.0", "vulnerable": true}, {"criteria": "cpe:2.3:a:samsung:samsung_keyboard:*:*:*:*:*:*:*:*", "matchCriteriaId": "1E637BBE-BF99-4464-9C17-F3D1AAF44FA5", "versionEndExcluding": "5.7.00.45", "versionStartIncluding": "5.7.00.0", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:samsung:samsung_keyboard:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF1C9578-2FA5-45E7-84C4-7D00AB0B13C4", "versionEndExcluding": "5.3.70.1", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "descriptions": [{"lang": "en", "value": "Improper usage of insecure protocol (i.e. HTTP) in SogouSDK of Chinese Samsung Keyboard prior to versions 5.3.70.1 in Android 11, 5.4.60.49, 5.4.85.5, 5.5.00.58 in Android 12, and 5.6.00.52, 5.6.10.42, 5.7.00.45 in Android 13 allows adjacent attackers to access keystroke data using Man-in-the-Middle attack."}, {"lang": "es", "value": "Uso inadecuado de un protocolo inseguro (es decir, HTTP) en SogouSDK of Chinese Samsung Keyboard anterior a las versiones 5.3.70.1 en Android 11, 5.4.60.49, 5.4.85.5, 5.5.00.58 en Android 12 y 5.6.00.52, 5.6.10.42, 5.7 .00.45 en Android 13 permite a atacantes adyacentes acceder a datos de pulsaciones de teclas mediante el ataque Man-in-the-Middle."}], "id": "CVE-2023-42579", "lastModified": "2024-11-21T08:22:49.837", "metrics": {"cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1"}, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "mobile.security@samsung.com", "type": "Secondary"}, {"cvssData": {"attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1"}, "exploitabilityScore": 1.6, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2023-12-05T03:15:18.967", "references": [{"source": "mobile.security@samsung.com", "tags": ["Vendor Advisory"], "url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2023&month=12"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2023&month=12"}], "sourceIdentifier": "mobile.security@samsung.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-319"}], "source": "nvd@nist.gov", "type": "Primary"}]}