Pebble Smartwatch devices through 4.3 mishandle UUID storage, which allows attackers to read an arbitrary application's flash storage, and access an arbitrary application's JavaScript instance, by modifying a UUID value within the header of a crafted application binary.
References
Link | Resource |
---|---|
https://blog.fletchto99.com/2016/november/pebble-app-sandbox-escape/ | Third Party Advisory |
https://blog.fletchto99.com/2016/november/pebble-app-sandbox-escape/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 02:44
Type | Values Removed | Values Added |
---|---|---|
References | () https://blog.fletchto99.com/2016/november/pebble-app-sandbox-escape/ - Third Party Advisory |
Information
Published : 2017-11-28 07:29
Updated : 2025-04-20 01:37
NVD link : CVE-2016-10702
Mitre link : CVE-2016-10702
CVE.ORG link : CVE-2016-10702
JSON object : View
Products Affected
pebble
- pebble_firmware
- pebble
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor