| Title | Trackr デバイスにおける情報漏えいに関する脆弱性 |
|---|---|
| Summary | Trackr デバイスには、情報漏えいに関する脆弱性が存在します。 |
| Possible impacts | 情報を取得される可能性があります。 |
| Solution | ベンダ情報および参考情報を参照して適切な対策を実施してください。 |
| Publication Date | Sept. 13, 2016, midnight |
| Registration Date | Sept. 21, 2018, 3:24 p.m. |
| Last Update | Sept. 21, 2018, 3:24 p.m. |
| CVSS3.0 : 低 | |
| Score | 3.5 |
|---|---|
| Vector | CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N |
| CVSS2.0 : 注意 | |
| Score | 3.3 |
|---|---|
| Vector | AV:A/AC:L/Au:N/C:P/I:N/A:N |
| TrackR, Inc |
| TrackR ファームウェア |
| No | Changed Details | Date of change |
|---|---|---|
| 1 | [2018年09月21日] 掲載 |
Sept. 21, 2018, 3:24 p.m. |
| Summary | The Trackr device ID is constructed of a manufacturer identifier of four zeroes followed by the BLE MAC address in reverse. The MAC address can be obtained by being in close proximity to the Bluetooth device, effectively exposing the device ID. The ID can be used to track devices. Updated apps, version 5.1.6 for iOS and 2.2.5 for Android, have been released by the vendor to address the vulnerabilities in CVE-2016-6538, CVE-2016-6539, CVE-2016-6540 and CVE-2016-6541. |
|---|---|
| Publication Date | July 7, 2018, 6:29 a.m. |
| Registration Date | Jan. 26, 2021, 2:15 p.m. |
| Last Update | Nov. 21, 2024, 11:56 a.m. |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:o:thetrackr:trackr_firmware:*:*:*:*:*:android:*:* | 2.2.5 | ||||
| cpe:2.3:o:thetrackr:trackr_firmware:*:*:*:*:*:iphone_os:*:* | 5.1.6 | ||||
| execution environment | |||||
| 1 | cpe:2.3:h:thetrackr:trackr:-:*:*:*:*:*:*:* | ||||