CVE-2019-12820

A vulnerability was found in the app 2.0 of the Shenzhen Jisiwei i3 robot vacuum cleaner. Actions performed on the app such as changing a password, and personal information it communicates with the server, use unencrypted HTTP. As an example, while logging in through the app to a Jisiwei account, the login request is being sent in cleartext. The vulnerability exists in both the Android and iOS version of the app. An attacker could exploit this by using an MiTM attack on the local network to obtain someone's login credentials, which gives them full access to the robot vacuum cleaner.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:jisiwei:i3_firmware:2.0:*:*:*:*:*:*:*
cpe:2.3:h:jisiwei:i3:-:*:*:*:*:*:*:*

History

07 Nov 2023, 03:03

Type Values Removed Values Added
References
  • {'url': 'https://www.kth.se/polopoly_fs/1.914058.1561621210!/Olsson_Larsson-Forsberg_vacuum.pdf', 'name': 'https://www.kth.se/polopoly_fs/1.914058.1561621210!/Olsson_Larsson-Forsberg_vacuum.pdf', 'tags': ['Exploit', 'Technical Description', 'Third Party Advisory'], 'refsource': 'MISC'}
  • () https://www.kth.se/polopoly_fs/1.914058.1561621210%21/Olsson_Larsson-Forsberg_vacuum.pdf -

Information

Published : 2019-07-19 18:15

Updated : 2024-02-28 17:08


NVD link : CVE-2019-12820

Mitre link : CVE-2019-12820

CVE.ORG link : CVE-2019-12820


JSON object : View

Products Affected

jisiwei

  • i3_firmware
  • i3
CWE
CWE-319

Cleartext Transmission of Sensitive Information