Improper JPAKE implementation allows offline PIN brute-forcing due to the initialization of random values to a known value, which leads to unauthorized authentication to amzn.lightning services.
This issue affects:
Amazon Fire TV Stick 3rd gen versions prior to 6.2.9.5.
Insignia TV with FireOS 7.6.3.3.
References
Link | Resource |
---|---|
https://www.bitdefender.com/blog/labs/vulnerabilities-identified-amazon-fire-tv-stick-insignia-fire-os-tv-series/ | Third Party Advisory |
https://www.bitdefender.com/blog/labs/vulnerabilities-identified-amazon-fire-tv-stick-insignia-fire-os-tv-series/ | Third Party Advisory |
Configurations
History
21 Nov 2024, 07:39
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.bitdefender.com/blog/labs/vulnerabilities-identified-amazon-fire-tv-stick-insignia-fire-os-tv-series/ - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.1 |
Information
Published : 2023-05-03 13:15
Updated : 2024-11-21 07:39
NVD link : CVE-2023-1385
Mitre link : CVE-2023-1385
CVE.ORG link : CVE-2023-1385
JSON object : View
Products Affected
amazon
- fire_os
- fire_tv_stick_3rd_gen
bestbuy
- insignia_tv
CWE
CWE-330
Use of Insufficiently Random Values