Show plain JSON{"containers": {"cna": {"affected": [{"platforms": ["iOS"], "product": "Bravo Mobile Application", "vendor": "TrackR", "versions": [{"status": "unaffected", "version": "5.1.6"}]}, {"platforms": ["Android"], "product": "Bravo Mobile Application", "vendor": "TrackR", "versions": [{"status": "unaffected", "version": "2.2.5"}]}], "credits": [{"lang": "en", "value": "Thanks to Deral Heiland and Adam Compton of Rapid7, Inc. for reporting this vulnerability."}], "datePublic": "2016-10-25T00:00:00", "descriptions": [{"lang": "en", "value": "TrackR Bravo device allows unauthenticated pairing, which enables unauthenticated connected applications to write to various device attributes. Updated apps, version 5.1.6 for iOS and 2.2.5 for Android, have been released by the vendor to address the vulnerabilities in CVE-2016-6538, CVE-2016-6539, CVE-2016-6540 and CVE-2016-6541."}], "problemTypes": [{"descriptions": [{"cweId": "CWE-306", "description": "CWE-306: Missing Authentication for Critical Function", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"dateUpdated": "2018-07-07T09:57:01", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc"}, "references": [{"name": "93874", "tags": ["vdb-entry", "x_refsource_BID"], "url": "http://www.securityfocus.com/bid/93874"}, {"tags": ["x_refsource_MISC"], "url": "https://www.kb.cert.org/vuls/id/TNOY-AF3KCZ"}, {"tags": ["x_refsource_MISC"], "url": "https://blog.rapid7.com/2016/10/25/multiple-bluetooth-low-energy-ble-tracker-vulnerabilities/"}, {"name": "VU#617567", "tags": ["third-party-advisory", "x_refsource_CERT-VN"], "url": "https://www.kb.cert.org/vuls/id/617567"}], "source": {"discovery": "UNKNOWN"}, "title": "TrackR Bravo device allows unauthenticated pairing, which enables unauthenticated connected applications to write to various device attributes", "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "cert@cert.org", "ID": "CVE-2016-6541", "STATE": "PUBLIC", "TITLE": "TrackR Bravo device allows unauthenticated pairing, which enables unauthenticated connected applications to write to various device attributes"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "Bravo Mobile Application", "version": {"version_data": [{"affected": "!", "platform": "iOS", "version_affected": "!", "version_value": "5.1.6"}, {"affected": "!", "platform": "Android", "version_affected": "!", "version_value": "2.2.5"}]}}]}, "vendor_name": "TrackR"}]}}, "credit": [{"lang": "eng", "value": "Thanks to Deral Heiland and Adam Compton of Rapid7, Inc. for reporting this vulnerability."}], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "TrackR Bravo device allows unauthenticated pairing, which enables unauthenticated connected applications to write to various device attributes. Updated apps, version 5.1.6 for iOS and 2.2.5 for Android, have been released by the vendor to address the vulnerabilities in CVE-2016-6538, CVE-2016-6539, CVE-2016-6540 and CVE-2016-6541."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "CWE-306: Missing Authentication for Critical Function"}]}]}, "references": {"reference_data": [{"name": "93874", "refsource": "BID", "url": "http://www.securityfocus.com/bid/93874"}, {"name": "https://www.kb.cert.org/vuls/id/TNOY-AF3KCZ", "refsource": "MISC", "url": "https://www.kb.cert.org/vuls/id/TNOY-AF3KCZ"}, {"name": "https://blog.rapid7.com/2016/10/25/multiple-bluetooth-low-energy-ble-tracker-vulnerabilities/", "refsource": "MISC", "url": "https://blog.rapid7.com/2016/10/25/multiple-bluetooth-low-energy-ble-tracker-vulnerabilities/"}, {"name": "VU#617567", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/617567"}]}, "source": {"discovery": "UNKNOWN"}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-06T01:36:27.330Z"}, "title": "CVE Program Container", "references": [{"name": "93874", "tags": ["vdb-entry", "x_refsource_BID", "x_transferred"], "url": "http://www.securityfocus.com/bid/93874"}, {"tags": ["x_refsource_MISC", "x_transferred"], "url": "https://www.kb.cert.org/vuls/id/TNOY-AF3KCZ"}, {"tags": ["x_refsource_MISC", "x_transferred"], "url": "https://blog.rapid7.com/2016/10/25/multiple-bluetooth-low-energy-ble-tracker-vulnerabilities/"}, {"name": "VU#617567", "tags": ["third-party-advisory", "x_refsource_CERT-VN", "x_transferred"], "url": "https://www.kb.cert.org/vuls/id/617567"}]}]}, "cveMetadata": {"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2016-6541", "datePublished": "2018-07-06T21:00:00", "dateReserved": "2016-08-03T00:00:00", "dateUpdated": "2024-08-06T01:36:27.330Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}