Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2016-6540
Modified
More InfoOfficial Page
Source-cret@cert.org
View Known Exploited Vulnerability (KEV) details
Published At-06 Jul, 2018 | 21:29
Updated At-09 Oct, 2019 | 23:19

Unauthenticated access to the cloud-based service maintained by TrackR Bravo is allowed for querying or sending GPS data for any Trackr device by using the tracker ID number which can be discovered as described in CVE-2016-6539. Updated apps, version 5.1.6 for iOS and 2.2.5 for Android, have been released by the vendor to address the vulnerabilities in CVE-2016-6538, CVE-2016-6539, CVE-2016-6540 and CVE-2016-6541.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.06.5MEDIUM
CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Primary2.03.3LOW
AV:A/AC:L/Au:N/C:P/I:N/A:N
CPE Matches

thetrackr
thetrackr
>>trackr_bravo_firmware>>Versions before 2.2.5(exclusive)
cpe:2.3:o:thetrackr:trackr_bravo_firmware:*:*:*:*:*:android:*:*
thetrackr
thetrackr
>>trackr_bravo_firmware>>Versions before 5.1.6(exclusive)
cpe:2.3:o:thetrackr:trackr_bravo_firmware:*:*:*:*:*:iphone_os:*:*
thetrackr
thetrackr
>>trackr_bravo>>-
cpe:2.3:h:thetrackr:trackr_bravo:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-200Primarynvd@nist.gov
CWE-306Secondarycret@cert.org
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.securityfocus.com/bid/93874cret@cert.org
Third Party Advisory
VDB Entry
https://blog.rapid7.com/2016/10/25/multiple-bluetooth-low-energy-ble-tracker-vulnerabilities/cret@cert.org
Third Party Advisory
https://www.kb.cert.org/vuls/id/617567cret@cert.org
Third Party Advisory
US Government Resource
https://www.kb.cert.org/vuls/id/TNOY-AF3KCZcret@cert.org
Third Party Advisory
US Government Resource
Change History
0Changes found

Details not found