製品・ソフトウェアに関する情報
Amazon Echo デバイスにおけるセッションの固定化の脆弱性
Title Amazon Echo デバイスにおけるセッションの固定化の脆弱性
Summary

** 未確定 ** 本件は、脆弱性として確定していません。 Amazon Echo デバイスには、セッションの固定化の脆弱性が存在します。 ベンダは、本脆弱性に対して異議を唱えています。 詳細については、以下の NVD の Current Description を確認してください。 https://nvd.nist.gov/vuln/detail/CVE-2018-11567

Possible impacts 情報を取得される可能性があります。
Solution

ベンダ情報および参考情報を参照して適切な対策を実施してください。

Publication Date April 25, 2018, midnight
Registration Date July 24, 2018, 4:37 p.m.
Last Update July 24, 2018, 4:37 p.m.
CVSS3.0 : 低
Score 3.3
Vector CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
CVSS2.0 : 警告
Score 4.3
Vector AV:N/AC:M/Au:N/C:P/I:N/A:N
Affected System
Amazon.com, Inc.
Echo Dot ファームウェア 2018/04/27 より前
Echo Plus ファームウェア 2018/04/27 より前
Echo Show ファームウェア 2018/04/27 より前
Echo Spot ファームウェア 2018/04/27 より前
Echo ファームウェア 2018/04/27 より前
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
その他
Change Log
No Changed Details Date of change
1 [2018年07月24日]
  掲載
July 24, 2018, 4:37 p.m.

NVD Vulnerability Information
CVE-2018-11567
Summary

Prior to 2018-04-27, the reprompt feature in Amazon Echo devices could be misused by a custom Alexa skill. The reprompt feature is designed so that if Alexa does not receive an input within 8 seconds, the device can speak a reprompt, then wait an additional 8 seconds for input; if the user still does not respond, the microphone is then turned off. The vulnerability involves empty output-speech reprompts, custom wildcard ("gibberish") input slots, and logging of detected speech. If a maliciously designed skill is installed, an attacker could obtain transcripts of speech not intended for Alexa to process, but simply spoken within the device's hearing range. NOTE: The vendor states "Customer trust is important to us and we take security and privacy seriously. We have put mitigations in place for detecting this type of skill behavior and reject or suppress those skills when we do. Customers do not need to take any action for these mitigations to work.

Publication Date May 31, 2018, 7:29 a.m.
Registration Date March 1, 2021, 6:46 p.m.
Last Update Nov. 21, 2024, 12:43 p.m.
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:o:amazon:echo_show_firmware:*:*:*:*:*:*:*:* 2018-04-27
execution environment
1 cpe:2.3:h:amazon:echo_show:-:*:*:*:*:*:*:*
Configuration2 or higher or less more than less than
cpe:2.3:o:amazon:echo_plus_firmware:*:*:*:*:*:*:*:* 2018-04-27
execution environment
1 cpe:2.3:h:amazon:echo_plus:-:*:*:*:*:*:*:*
Configuration3 or higher or less more than less than
cpe:2.3:o:amazon:echo_dot_firmware:*:*:*:*:*:*:*:* 2018-04-27
execution environment
1 cpe:2.3:h:amazon:echo_dot:-:*:*:*:*:*:*:*
Configuration4 or higher or less more than less than
cpe:2.3:o:amazon:echo_spot_firmware:*:*:*:*:*:*:*:* 2018-04-27
execution environment
1 cpe:2.3:h:amazon:echo_spot:-:*:*:*:*:*:*:*
Configuration5 or higher or less more than less than
cpe:2.3:o:amazon:echo_firmware:*:*:*:*:*:*:*:* 2018-04-27
execution environment
1 cpe:2.3:h:amazon:echo:-:*:*:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List