Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:amazon:ring_video_doorbell_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4BDA71F8-60D9-42FC-A381-EDAB6E8C5BAC", "versionEndExcluding": "3.4.7", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:amazon:ring_video_doorbell:-:*:*:*:*:*:*:*", "matchCriteriaId": "C3A0F9F1-DF23-4B91-8770-AB661B7DA517", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "descriptions": [{"lang": "en", "value": "Amazon Ring Doorbell before 3.4.7 mishandles encryption, which allows attackers to obtain audio and video data, or insert spoofed video that does not correspond to the actual person at the door."}, {"lang": "es", "value": "Ring Doorbell de Amazon, en versiones anteriores a la 3.4.7, gestiona el cifrado de manera incorrecta, lo que permite a los atacantes obtener los datos de audio y v\u00eddeo o insertar un v\u00eddeo suplantado que no corresponde a la persona real que se encuentra en la puerta."}], "id": "CVE-2019-9483", "lastModified": "2024-11-21T04:51:42.390", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0"}, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2019-03-01T05:29:01.133", "references": [{"source": "cve@mitre.org", "tags": ["Third Party Advisory"], "url": "https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/"}, {"source": "cve@mitre.org", "tags": ["Third Party Advisory"], "url": "https://www.theverge.com/2019/2/27/18243296/ring-doorbell-hacked-fake-images-security-experts"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://www.theverge.com/2019/2/27/18243296/ring-doorbell-hacked-fake-images-security-experts"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-327"}], "source": "nvd@nist.gov", "type": "Primary"}]}