First published: Wed Jan 22 2020(Updated: )
The wpa_supplicant system service in Samsung Galaxy Gear series allows an unprivileged process to fully control the Wi-Fi interface, due to the lack of its D-Bus security policy configurations. This affects Tizen-based firmwares including Samsung Galaxy Gear series before build RE2.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Samsung Galaxy Gear Firmware | <re2 | |
Samsung Galaxy Gear | ||
Samsung Gear 2 Firmware | <re2 | |
Samsung Gear 2 | ||
Samsung Gear Live Firmware | <re2 | |
Samsung Gear Live | ||
Samsung Gear S Firmware | <re2 | |
Samsung Gear S | ||
Samsung Gear S2 Firmware | <re2 | |
Samsung Gear S2 | ||
Samsung Gear S3 Firmware | <re2 | |
Samsung Gear S3 | ||
Samsung Gear Sport Firmware | <re2 | |
Samsung Gear Sport | ||
Samsung Gear Fit Firmware | <re2 | |
Samsung Gear Fit | ||
Samsung Gear Fit 2 Firmware | <re2 | |
Samsung Gear Fit 2 | ||
Samsung Gear Fit 2 Pro Firmware | <re2 | |
Samsung Gear Fit 2 Pro |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-16272 is a vulnerability in the wpa_supplicant system service in Samsung Galaxy Gear series, which allows an unprivileged process to fully control the Wi-Fi interface.
CVE-2018-16272 has a severity rating of 9.8 out of 10, indicating a critical vulnerability.
CVE-2018-16272 affects Tizen-based firmwares including Samsung Galaxy Gear series before build RE2.
An unprivileged process can exploit CVE-2018-16272 by manipulating the Wi-Fi interface due to the lack of D-Bus security policy configurations.
You can find more information about CVE-2018-16272 at the following references: [link1](https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf) [link2](https://www.youtube.com/watch?v=3IdgBwbOT-g&feature=youtu.be)