First published: Wed Jan 22 2020(Updated: )
The wnoti system service in Samsung Galaxy Gear series allows an unprivileged process to take over the internal notification message data, due to improper D-Bus security policy configurations. This affects Tizen-based firmwares including Samsung Galaxy Gear series before build RE2.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Samsung Galaxy Gear Firmware | <re2 | |
Samsung Galaxy Gear | ||
Samsung Gear 2 Firmware | <re2 | |
Samsung Gear 2 | ||
Samsung Gear Live Firmware | <re2 | |
Samsung Gear Live | ||
Samsung Gear S Firmware | <re2 | |
Samsung Gear S | ||
Samsung Gear S2 Firmware | <re2 | |
Samsung Gear S2 | ||
Samsung Gear S3 Firmware | <re2 | |
Samsung Gear S3 | ||
Samsung Gear Sport Firmware | <re2 | |
Samsung Gear Sport | ||
Samsung Gear Fit Firmware | <re2 | |
Samsung Gear Fit | ||
Samsung Gear Fit 2 Firmware | <re2 | |
Samsung Gear Fit 2 | ||
Samsung Gear Fit 2 Pro Firmware | <re2 | |
Samsung Gear Fit 2 Pro |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Samsung Galaxy Gear vulnerability is CVE-2018-16269.
The severity of CVE-2018-16269 is high with a severity value of 7.5.
CVE-2018-16269 allows an unprivileged process to take over the internal notification message data on Samsung Galaxy Gear devices.
CVE-2018-16269 affects Tizen-based firmwares including Samsung Galaxy Gear series before build RE2.
To fix CVE-2018-16269 on your Samsung Galaxy Gear device, it is recommended to update to the latest firmware build RE2 or above.