Vulnerabilites related to TrackR - Bravo Mobile Application
CVE-2016-6541 (GCVE-0-2016-6541)
Vulnerability from cvelistv5
Published
2018-07-06 21:00
Modified
2024-08-06 01:36
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-306 - Missing Authentication for Critical Function
Summary
TrackR Bravo device allows unauthenticated pairing, which enables unauthenticated connected applications to write to various device attributes. Updated apps, version 5.1.6 for iOS and 2.2.5 for Android, have been released by the vendor to address the vulnerabilities in CVE-2016-6538, CVE-2016-6539, CVE-2016-6540 and CVE-2016-6541.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
► | TrackR | Bravo Mobile Application | ||
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:36:27.330Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "93874", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/93874" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/TNOY-AF3KCZ" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://blog.rapid7.com/2016/10/25/multiple-bluetooth-low-energy-ble-tracker-vulnerabilities/" }, { "name": "VU#617567", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/617567" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "iOS" ], "product": "Bravo Mobile Application", "vendor": "TrackR", "versions": [ { "status": "unaffected", "version": "5.1.6" } ] }, { "platforms": [ "Android" ], "product": "Bravo Mobile Application", "vendor": "TrackR", "versions": [ { "status": "unaffected", "version": "2.2.5" } ] } ], "credits": [ { "lang": "en", "value": "Thanks to Deral Heiland and Adam Compton of Rapid7, Inc. for reporting this vulnerability." } ], "datePublic": "2016-10-25T00:00:00", "descriptions": [ { "lang": "en", "value": "TrackR Bravo device allows unauthenticated pairing, which enables unauthenticated connected applications to write to various device attributes. Updated apps, version 5.1.6 for iOS and 2.2.5 for Android, have been released by the vendor to address the vulnerabilities in CVE-2016-6538, CVE-2016-6539, CVE-2016-6540 and CVE-2016-6541." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306: Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-07T09:57:01", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "name": "93874", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/93874" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.kb.cert.org/vuls/id/TNOY-AF3KCZ" }, { "tags": [ "x_refsource_MISC" ], "url": "https://blog.rapid7.com/2016/10/25/multiple-bluetooth-low-energy-ble-tracker-vulnerabilities/" }, { "name": "VU#617567", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "https://www.kb.cert.org/vuls/id/617567" } ], "source": { "discovery": "UNKNOWN" }, "title": "TrackR Bravo device allows unauthenticated pairing, which enables unauthenticated connected applications to write to various device attributes", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2016-6541", "STATE": "PUBLIC", "TITLE": "TrackR Bravo device allows unauthenticated pairing, which enables unauthenticated connected applications to write to various device attributes" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Bravo Mobile Application", "version": { "version_data": [ { "affected": "!", "platform": "iOS", "version_affected": "!", "version_value": "5.1.6" }, { "affected": "!", "platform": "Android", "version_affected": "!", "version_value": "2.2.5" } ] } } ] }, "vendor_name": "TrackR" } ] } }, "credit": [ { "lang": "eng", "value": "Thanks to Deral Heiland and Adam Compton of Rapid7, Inc. for reporting this vulnerability." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "TrackR Bravo device allows unauthenticated pairing, which enables unauthenticated connected applications to write to various device attributes. Updated apps, version 5.1.6 for iOS and 2.2.5 for Android, have been released by the vendor to address the vulnerabilities in CVE-2016-6538, CVE-2016-6539, CVE-2016-6540 and CVE-2016-6541." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-306: Missing Authentication for Critical Function" } ] } ] }, "references": { "reference_data": [ { "name": "93874", "refsource": "BID", "url": "http://www.securityfocus.com/bid/93874" }, { "name": "https://www.kb.cert.org/vuls/id/TNOY-AF3KCZ", "refsource": "MISC", "url": "https://www.kb.cert.org/vuls/id/TNOY-AF3KCZ" }, { "name": "https://blog.rapid7.com/2016/10/25/multiple-bluetooth-low-energy-ble-tracker-vulnerabilities/", "refsource": "MISC", "url": "https://blog.rapid7.com/2016/10/25/multiple-bluetooth-low-energy-ble-tracker-vulnerabilities/" }, { "name": "VU#617567", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/617567" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2016-6541", "datePublished": "2018-07-06T21:00:00", "dateReserved": "2016-08-03T00:00:00", "dateUpdated": "2024-08-06T01:36:27.330Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-6540 (GCVE-0-2016-6540)
Vulnerability from cvelistv5
Published
2018-07-06 21:00
Modified
2024-08-06 01:36
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-306 - Missing Authentication for Critical Function
Summary
Unauthenticated access to the cloud-based service maintained by TrackR Bravo is allowed for querying or sending GPS data for any Trackr device by using the tracker ID number which can be discovered as described in CVE-2016-6539. Updated apps, version 5.1.6 for iOS and 2.2.5 for Android, have been released by the vendor to address the vulnerabilities in CVE-2016-6538, CVE-2016-6539, CVE-2016-6540 and CVE-2016-6541.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
► | TrackR | Bravo Mobile Application | ||
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:36:27.351Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "93874", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/93874" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/TNOY-AF3KCZ" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://blog.rapid7.com/2016/10/25/multiple-bluetooth-low-energy-ble-tracker-vulnerabilities/" }, { "name": "VU#617567", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/617567" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "iOS" ], "product": "Bravo Mobile Application", "vendor": "TrackR", "versions": [ { "status": "unaffected", "version": "5.1.6" } ] }, { "platforms": [ "Android" ], "product": "Bravo Mobile Application", "vendor": "TrackR", "versions": [ { "status": "unaffected", "version": "2.2.5" } ] } ], "credits": [ { "lang": "en", "value": "Thanks to Deral Heiland and Adam Compton of Rapid7, Inc. for reporting this vulnerability." } ], "datePublic": "2016-10-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Unauthenticated access to the cloud-based service maintained by TrackR Bravo is allowed for querying or sending GPS data for any Trackr device by using the tracker ID number which can be discovered as described in CVE-2016-6539. Updated apps, version 5.1.6 for iOS and 2.2.5 for Android, have been released by the vendor to address the vulnerabilities in CVE-2016-6538, CVE-2016-6539, CVE-2016-6540 and CVE-2016-6541." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306: Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-07T09:57:01", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "name": "93874", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/93874" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.kb.cert.org/vuls/id/TNOY-AF3KCZ" }, { "tags": [ "x_refsource_MISC" ], "url": "https://blog.rapid7.com/2016/10/25/multiple-bluetooth-low-energy-ble-tracker-vulnerabilities/" }, { "name": "VU#617567", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "https://www.kb.cert.org/vuls/id/617567" } ], "source": { "discovery": "UNKNOWN" }, "title": "TrackR Bravo is missing authentication for the cloud service and allows querying or sending of GPS data from unauthenticated users", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2016-6540", "STATE": "PUBLIC", "TITLE": "TrackR Bravo is missing authentication for the cloud service and allows querying or sending of GPS data from unauthenticated users" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Bravo Mobile Application", "version": { "version_data": [ { "affected": "!", "platform": "iOS", "version_affected": "!", "version_value": "5.1.6" }, { "affected": "!", "platform": "Android", "version_affected": "!", "version_value": "2.2.5" } ] } } ] }, "vendor_name": "TrackR" } ] } }, "credit": [ { "lang": "eng", "value": "Thanks to Deral Heiland and Adam Compton of Rapid7, Inc. for reporting this vulnerability." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unauthenticated access to the cloud-based service maintained by TrackR Bravo is allowed for querying or sending GPS data for any Trackr device by using the tracker ID number which can be discovered as described in CVE-2016-6539. Updated apps, version 5.1.6 for iOS and 2.2.5 for Android, have been released by the vendor to address the vulnerabilities in CVE-2016-6538, CVE-2016-6539, CVE-2016-6540 and CVE-2016-6541." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-306: Missing Authentication for Critical Function" } ] } ] }, "references": { "reference_data": [ { "name": "93874", "refsource": "BID", "url": "http://www.securityfocus.com/bid/93874" }, { "name": "https://www.kb.cert.org/vuls/id/TNOY-AF3KCZ", "refsource": "MISC", "url": "https://www.kb.cert.org/vuls/id/TNOY-AF3KCZ" }, { "name": "https://blog.rapid7.com/2016/10/25/multiple-bluetooth-low-energy-ble-tracker-vulnerabilities/", "refsource": "MISC", "url": "https://blog.rapid7.com/2016/10/25/multiple-bluetooth-low-energy-ble-tracker-vulnerabilities/" }, { "name": "VU#617567", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/617567" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2016-6540", "datePublished": "2018-07-06T21:00:00", "dateReserved": "2016-08-03T00:00:00", "dateUpdated": "2024-08-06T01:36:27.351Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-6538 (GCVE-0-2016-6538)
Vulnerability from cvelistv5
Published
2018-07-06 21:00
Modified
2024-08-06 01:36
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-313 - Cleartext Storage in a File or on Disk
Summary
The TrackR Bravo mobile app stores the account password used to authenticate to the cloud API in cleartext in the cache.db file. Updated apps, version 5.1.6 for iOS and 2.2.5 for Android, have been released by the vendor to address the vulnerabilities in CVE-2016-6538, CVE-2016-6539, CVE-2016-6540 and CVE-2016-6541.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
► | TrackR | Bravo Mobile Application | ||
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:36:27.362Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "93874", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/93874" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/TNOY-AF3KCZ" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://blog.rapid7.com/2016/10/25/multiple-bluetooth-low-energy-ble-tracker-vulnerabilities/" }, { "name": "VU#617567", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/617567" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "iOS" ], "product": "Bravo Mobile Application", "vendor": "TrackR", "versions": [ { "status": "unaffected", "version": "5.1.6" } ] }, { "platforms": [ "Android" ], "product": "Bravo Mobile Application", "vendor": "TrackR", "versions": [ { "status": "unaffected", "version": "2.2.5" } ] } ], "credits": [ { "lang": "en", "value": "Thanks to Deral Heiland and Adam Compton of Rapid7, Inc. for reporting this vulnerability." } ], "datePublic": "2016-10-25T00:00:00", "descriptions": [ { "lang": "en", "value": "The TrackR Bravo mobile app stores the account password used to authenticate to the cloud API in cleartext in the cache.db file. Updated apps, version 5.1.6 for iOS and 2.2.5 for Android, have been released by the vendor to address the vulnerabilities in CVE-2016-6538, CVE-2016-6539, CVE-2016-6540 and CVE-2016-6541." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-313", "description": "CWE-313: Cleartext Storage in a File or on Disk", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-07T09:57:01", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "name": "93874", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/93874" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.kb.cert.org/vuls/id/TNOY-AF3KCZ" }, { "tags": [ "x_refsource_MISC" ], "url": "https://blog.rapid7.com/2016/10/25/multiple-bluetooth-low-energy-ble-tracker-vulnerabilities/" }, { "name": "VU#617567", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "https://www.kb.cert.org/vuls/id/617567" } ], "source": { "discovery": "UNKNOWN" }, "title": "TrackR Bravo mobile application stores account passwords in cleartext", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2016-6538", "STATE": "PUBLIC", "TITLE": "TrackR Bravo mobile application stores account passwords in cleartext" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Bravo Mobile Application", "version": { "version_data": [ { "affected": "!", "platform": "iOS", "version_affected": "!", "version_value": "5.1.6" }, { "affected": "!", "platform": "Android", "version_affected": "!", "version_value": "2.2.5" } ] } } ] }, "vendor_name": "TrackR" } ] } }, "credit": [ { "lang": "eng", "value": "Thanks to Deral Heiland and Adam Compton of Rapid7, Inc. for reporting this vulnerability." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The TrackR Bravo mobile app stores the account password used to authenticate to the cloud API in cleartext in the cache.db file. Updated apps, version 5.1.6 for iOS and 2.2.5 for Android, have been released by the vendor to address the vulnerabilities in CVE-2016-6538, CVE-2016-6539, CVE-2016-6540 and CVE-2016-6541." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-313: Cleartext Storage in a File or on Disk" } ] } ] }, "references": { "reference_data": [ { "name": "93874", "refsource": "BID", "url": "http://www.securityfocus.com/bid/93874" }, { "name": "https://www.kb.cert.org/vuls/id/TNOY-AF3KCZ", "refsource": "MISC", "url": "https://www.kb.cert.org/vuls/id/TNOY-AF3KCZ" }, { "name": "https://blog.rapid7.com/2016/10/25/multiple-bluetooth-low-energy-ble-tracker-vulnerabilities/", "refsource": "MISC", "url": "https://blog.rapid7.com/2016/10/25/multiple-bluetooth-low-energy-ble-tracker-vulnerabilities/" }, { "name": "VU#617567", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/617567" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2016-6538", "datePublished": "2018-07-06T21:00:00", "dateReserved": "2016-08-03T00:00:00", "dateUpdated": "2024-08-06T01:36:27.362Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-6539 (GCVE-0-2016-6539)
Vulnerability from cvelistv5
Published
2018-07-06 21:00
Modified
2024-08-06 01:36
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-200 - Information Exposure
Summary
The Trackr device ID is constructed of a manufacturer identifier of four zeroes followed by the BLE MAC address in reverse. The MAC address can be obtained by being in close proximity to the Bluetooth device, effectively exposing the device ID. The ID can be used to track devices. Updated apps, version 5.1.6 for iOS and 2.2.5 for Android, have been released by the vendor to address the vulnerabilities in CVE-2016-6538, CVE-2016-6539, CVE-2016-6540 and CVE-2016-6541.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
► | TrackR | Bravo Mobile Application | ||
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:36:27.350Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "93874", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/93874" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/TNOY-AF3KCZ" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://blog.rapid7.com/2016/10/25/multiple-bluetooth-low-energy-ble-tracker-vulnerabilities/" }, { "name": "VU#617567", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/617567" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "iOS" ], "product": "Bravo Mobile Application", "vendor": "TrackR", "versions": [ { "status": "unaffected", "version": "5.1.6" } ] }, { "platforms": [ "Android" ], "product": "Bravo Mobile Application", "vendor": "TrackR", "versions": [ { "status": "unaffected", "version": "2.2.5" } ] } ], "credits": [ { "lang": "en", "value": "Thanks to Deral Heiland and Adam Compton of Rapid7, Inc. for reporting this vulnerability." } ], "datePublic": "2016-10-25T00:00:00", "descriptions": [ { "lang": "en", "value": "The Trackr device ID is constructed of a manufacturer identifier of four zeroes followed by the BLE MAC address in reverse. The MAC address can be obtained by being in close proximity to the Bluetooth device, effectively exposing the device ID. The ID can be used to track devices. Updated apps, version 5.1.6 for iOS and 2.2.5 for Android, have been released by the vendor to address the vulnerabilities in CVE-2016-6538, CVE-2016-6539, CVE-2016-6540 and CVE-2016-6541." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Information Exposure", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-07T09:57:01", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "name": "93874", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/93874" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.kb.cert.org/vuls/id/TNOY-AF3KCZ" }, { "tags": [ "x_refsource_MISC" ], "url": "https://blog.rapid7.com/2016/10/25/multiple-bluetooth-low-energy-ble-tracker-vulnerabilities/" }, { "name": "VU#617567", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "https://www.kb.cert.org/vuls/id/617567" } ], "source": { "discovery": "UNKNOWN" }, "title": "TrackR Bravo MAC address can be exposed in close proximity and used to obtain the device ID", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2016-6539", "STATE": "PUBLIC", "TITLE": "TrackR Bravo MAC address can be exposed in close proximity and used to obtain the device ID" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Bravo Mobile Application", "version": { "version_data": [ { "affected": "!", "platform": "iOS", "version_affected": "!", "version_value": "5.1.6" }, { "affected": "!", "platform": "Android", "version_affected": "!", "version_value": "2.2.5" } ] } } ] }, "vendor_name": "TrackR" } ] } }, "credit": [ { "lang": "eng", "value": "Thanks to Deral Heiland and Adam Compton of Rapid7, Inc. for reporting this vulnerability." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Trackr device ID is constructed of a manufacturer identifier of four zeroes followed by the BLE MAC address in reverse. The MAC address can be obtained by being in close proximity to the Bluetooth device, effectively exposing the device ID. The ID can be used to track devices. Updated apps, version 5.1.6 for iOS and 2.2.5 for Android, have been released by the vendor to address the vulnerabilities in CVE-2016-6538, CVE-2016-6539, CVE-2016-6540 and CVE-2016-6541." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200: Information Exposure" } ] } ] }, "references": { "reference_data": [ { "name": "93874", "refsource": "BID", "url": "http://www.securityfocus.com/bid/93874" }, { "name": "https://www.kb.cert.org/vuls/id/TNOY-AF3KCZ", "refsource": "MISC", "url": "https://www.kb.cert.org/vuls/id/TNOY-AF3KCZ" }, { "name": "https://blog.rapid7.com/2016/10/25/multiple-bluetooth-low-energy-ble-tracker-vulnerabilities/", "refsource": "MISC", "url": "https://blog.rapid7.com/2016/10/25/multiple-bluetooth-low-energy-ble-tracker-vulnerabilities/" }, { "name": "VU#617567", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/617567" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2016-6539", "datePublished": "2018-07-06T21:00:00", "dateReserved": "2016-08-03T00:00:00", "dateUpdated": "2024-08-06T01:36:27.350Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }