CVE-2015-4400

Ring (formerly DoorBot) video doorbells allow remote attackers to obtain sensitive information about the wireless network configuration by pressing the set up button and leveraging an API in the GainSpan Wi-Fi module.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:ring:ring_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:ring:ring:-:*:*:*:*:*:*:*

History

21 Nov 2024, 02:31

Type Values Removed Values Added
References () https://blog.fortinet.com/2016/01/22/cve-2015-4400-backdoorbot-network-configuration-leak-on-a-connected-doorbell - Broken Link () https://blog.fortinet.com/2016/01/22/cve-2015-4400-backdoorbot-network-configuration-leak-on-a-connected-doorbell - Broken Link
References () https://fortiguard.com/zeroday/FG-VD-15-021 - Third Party Advisory () https://fortiguard.com/zeroday/FG-VD-15-021 - Third Party Advisory
References () https://www.pentestpartners.com/security-blog/steal-your-wi-fi-key-from-your-doorbell-iot-wtf/ - Third Party Advisory () https://www.pentestpartners.com/security-blog/steal-your-wi-fi-key-from-your-doorbell-iot-wtf/ - Third Party Advisory

Information

Published : 2018-02-06 16:29

Updated : 2024-11-21 02:31


NVD link : CVE-2015-4400

Mitre link : CVE-2015-4400

CVE.ORG link : CVE-2015-4400


JSON object : View

Products Affected

ring

  • ring
  • ring_firmware
CWE
CWE-255

Credentials Management Errors