Pebble Smartwatch devices through 4.3 mishandle UUID storage, which allows attackers to read an arbitrary application's flash storage, and access an arbitrary application's JavaScript instance, by modifying a UUID value within the header of a crafted application binary.
References
Link | Resource |
---|---|
https://blog.fletchto99.com/2016/november/pebble-app-sandbox-escape/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2017-11-28 07:29
Updated : 2024-02-04 19:29
NVD link : CVE-2016-10702
Mitre link : CVE-2016-10702
CVE.ORG link : CVE-2016-10702
JSON object : View
Products Affected
pebble
- pebble_firmware
- pebble
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor