CVE-2019-9483

Amazon Ring Doorbell before 3.4.7 mishandles encryption, which allows attackers to obtain audio and video data, or insert spoofed video that does not correspond to the actual person at the door.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:amazon:ring_video_doorbell_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:amazon:ring_video_doorbell:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:51

Type Values Removed Values Added
References () https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/ - Third Party Advisory () https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/ - Third Party Advisory
References () https://www.theverge.com/2019/2/27/18243296/ring-doorbell-hacked-fake-images-security-experts - Third Party Advisory () https://www.theverge.com/2019/2/27/18243296/ring-doorbell-hacked-fake-images-security-experts - Third Party Advisory

Information

Published : 2019-03-01 05:29

Updated : 2024-11-21 04:51


NVD link : CVE-2019-9483

Mitre link : CVE-2019-9483

CVE.ORG link : CVE-2019-9483


JSON object : View

Products Affected

amazon

  • ring_video_doorbell_firmware
  • ring_video_doorbell
CWE
CWE-327

Use of a Broken or Risky Cryptographic Algorithm