ID

VAR-201811-0484


CVE

CVE-2018-3920


TITLE

Yi Home Camera Input validation vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2018-011705

DESCRIPTION

An exploitable code execution vulnerability exists in the firmware update functionality of the Yi Home Camera 27US 1.8.7.0D. A specially crafted 7-Zip file can cause a CRC collision, resulting in a firmware update and code execution. An attacker can insert an SDcard to trigger this vulnerability. Yi Home Camera Contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. YiHomeCamera is a globally sold IoT home camera. Yi Home Camera 27US is a network camera product of Yi Technology Company in the United States

Trust: 2.34

sources: NVD: CVE-2018-3920 // JVNDB: JVNDB-2018-011705 // CNVD: CNVD-2018-22813 // VULHUB: VHN-133951 // VULMON: CVE-2018-3920

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2018-22813

AFFECTED PRODUCTS

vendor:yitechnologymodel:yi home camerascope:eqversion:1.8.7.0d

Trust: 1.6

vendor:yimodel:home camerascope:eqversion:27us 1.8.7.0d

Trust: 0.8

vendor:yimodel:technology home camera 27us 1.8.7.0dscope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2018-22813 // JVNDB: JVNDB-2018-011705 // CNNVD: CNNVD-201811-037 // NVD: CVE-2018-3920

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-3920
value: MEDIUM

Trust: 1.0

talos-cna@cisco.com: CVE-2018-3920
value: HIGH

Trust: 1.0

NVD: CVE-2018-3920
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2018-22813
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201811-037
value: MEDIUM

Trust: 0.6

VULHUB: VHN-133951
value: MEDIUM

Trust: 0.1

VULMON: CVE-2018-3920
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2018-3920
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2018-22813
severity: HIGH
baseScore: 8.3
vectorString: AV:A/AC:L/AU:N/C:C/I:C/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-133951
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-3920
baseSeverity: MEDIUM
baseScore: 6.8
vectorString: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: PHYSICAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.9
impactScore: 5.9
version: 3.1

Trust: 1.0

talos-cna@cisco.com: CVE-2018-3920
baseSeverity: HIGH
baseScore: 7.6
vectorString: CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
attackVector: PHYSICAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.9
impactScore: 6.0
version: 3.0

Trust: 1.0

NVD: CVE-2018-3920
baseSeverity: MEDIUM
baseScore: 6.8
vectorString: CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: PHYSICAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2018-22813 // VULHUB: VHN-133951 // VULMON: CVE-2018-3920 // JVNDB: JVNDB-2018-011705 // CNNVD: CNNVD-201811-037 // NVD: CVE-2018-3920 // NVD: CVE-2018-3920

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:CWE-20

Trust: 0.9

sources: VULHUB: VHN-133951 // JVNDB: JVNDB-2018-011705 // NVD: CVE-2018-3920

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201811-037

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-201811-037

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-011705

PATCH

title:Top Pageurl:https://www.yitechnology.com/

Trust: 0.8

title:Patch for YiHomeCamera Code Execution Vulnerability (CNVD-2018-22813)url:https://www.cnvd.org.cn/patchInfo/show/144193

Trust: 0.6

title:Yi Home Camera 27US Security vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=86581

Trust: 0.6

title: - url:https://github.com/Live-Hack-CVE/CVE-2018-3920

Trust: 0.1

sources: CNVD: CNVD-2018-22813 // VULMON: CVE-2018-3920 // JVNDB: JVNDB-2018-011705 // CNNVD: CNNVD-201811-037

EXTERNAL IDS

db:NVDid:CVE-2018-3920

Trust: 3.2

db:TALOSid:TALOS-2018-0584

Trust: 2.6

db:JVNDBid:JVNDB-2018-011705

Trust: 0.8

db:CNNVDid:CNNVD-201811-037

Trust: 0.7

db:CNVDid:CNVD-2018-22813

Trust: 0.6

db:SEEBUGid:SSVID-97639

Trust: 0.1

db:VULHUBid:VHN-133951

Trust: 0.1

db:VULMONid:CVE-2018-3920

Trust: 0.1

sources: CNVD: CNVD-2018-22813 // VULHUB: VHN-133951 // VULMON: CVE-2018-3920 // JVNDB: JVNDB-2018-011705 // CNNVD: CNNVD-201811-037 // NVD: CVE-2018-3920

REFERENCES

url:https://www.talosintelligence.com/vulnerability_reports/talos-2018-0584

Trust: 2.0

url:https://nvd.nist.gov/vuln/detail/cve-2018-3920

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3920

Trust: 0.8

url:https://talosintelligence.com/vulnerability_reports/talos-2018-0584

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:https://github.com/live-hack-cve/cve-2018-3920

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2018-22813 // VULHUB: VHN-133951 // VULMON: CVE-2018-3920 // JVNDB: JVNDB-2018-011705 // CNNVD: CNNVD-201811-037 // NVD: CVE-2018-3920

SOURCES

db:CNVDid:CNVD-2018-22813
db:VULHUBid:VHN-133951
db:VULMONid:CVE-2018-3920
db:JVNDBid:JVNDB-2018-011705
db:CNNVDid:CNNVD-201811-037
db:NVDid:CVE-2018-3920

LAST UPDATE DATE

2024-11-23T22:12:13.753000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2018-22813date:2018-11-09T00:00:00
db:VULHUBid:VHN-133951date:2023-02-02T00:00:00
db:VULMONid:CVE-2018-3920date:2023-02-02T00:00:00
db:JVNDBid:JVNDB-2018-011705date:2019-01-18T00:00:00
db:CNNVDid:CNNVD-201811-037date:2023-02-03T00:00:00
db:NVDid:CVE-2018-3920date:2024-11-21T04:06:18.243

SOURCES RELEASE DATE

db:CNVDid:CNVD-2018-22813date:2018-11-09T00:00:00
db:VULHUBid:VHN-133951date:2018-11-02T00:00:00
db:VULMONid:CVE-2018-3920date:2018-11-02T00:00:00
db:JVNDBid:JVNDB-2018-011705date:2019-01-18T00:00:00
db:CNNVDid:CNNVD-201811-037date:2018-11-05T00:00:00
db:NVDid:CVE-2018-3920date:2018-11-02T17:29:00.523