ID

VAR-201905-1153


CVE

CVE-2019-11561


TITLE

plural Chuango Access control vulnerabilities in products

Trust: 0.8

sources: JVNDB: JVNDB-2019-004420

DESCRIPTION

The Chuango 433 MHz burglar-alarm product line is vulnerable to a Denial of Service attack. When the condition is triggered, the OV2 base station is unable to process sensor states and effectively prevents the alarm from setting off, as demonstrated by Chuango branded products, and non-Chuango branded products such as the Eminent EM8617 OV2 Wifi Alarm System. plural Chuango The product contains an access control vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Chuango Wifi Alarm System, etc. are a set of security alarm systems of China Chuango Company. Security flaws exist in several Chuango products. The following products and versions are affected: Chuango Wifi Alarm System (all versions); Chuango Wifi/Cellular Smart Home System H4 Plus (all versions); Wifi Alarm System AWV Plus (all versions); G5W 3G (all versions); GSM/SMS /RFID Touch Alarm System G5 Plus (all versions); Chuango GSM/SMS Alarm System G3 (all versions); G5W (all versions); Dual-Network Alarm System B11 (all versions); PSTN Alarm System A8 (all versions); PSTN/LCD/RFID Touch Alarm System A11 (all versions); CG-105S On-Site Alarm System (all versions)

Trust: 1.71

sources: NVD: CVE-2019-11561 // JVNDB: JVNDB-2019-004420 // VULHUB: VHN-143220

AFFECTED PRODUCTS

vendor:chuangomodel:h4 plusscope:eqversion:*

Trust: 1.0

vendor:chuangomodel:cg-105sscope:eqversion:*

Trust: 1.0

vendor:chuangomodel:a11scope:eqversion:*

Trust: 1.0

vendor:chuangomodel:awv plusscope:eqversion:*

Trust: 1.0

vendor:chuangomodel:b11scope:eqversion:*

Trust: 1.0

vendor:chuangomodel:g5wscope:eqversion:*

Trust: 1.0

vendor:chuangomodel:g5w 3gscope:eqversion:*

Trust: 1.0

vendor:chuangomodel:g5 plusscope:eqversion:*

Trust: 1.0

vendor:chuangomodel:g3scope:eqversion:*

Trust: 1.0

vendor:chuangomodel:a8scope:eqversion:*

Trust: 1.0

vendor:chuango security corpmodel:a11scope: - version: -

Trust: 0.8

vendor:chuango security corpmodel:a8scope: - version: -

Trust: 0.8

vendor:chuango security corpmodel:awv plusscope: - version: -

Trust: 0.8

vendor:chuango security corpmodel:b11scope: - version: -

Trust: 0.8

vendor:chuango security corpmodel:cg-105sscope: - version: -

Trust: 0.8

vendor:chuango security corpmodel:g3scope: - version: -

Trust: 0.8

vendor:chuango security corpmodel:g5 plusscope: - version: -

Trust: 0.8

vendor:chuango security corpmodel:g5w 3gscope: - version: -

Trust: 0.8

vendor:chuango security corpmodel:g5wscope: - version: -

Trust: 0.8

vendor:chuango security corpmodel:h4 plusscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2019-004420 // NVD: CVE-2019-11561

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-11561
value: MEDIUM

Trust: 1.0

NVD: CVE-2019-11561
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201905-200
value: MEDIUM

Trust: 0.6

VULHUB: VHN-143220
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2019-11561
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-143220
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-11561
baseSeverity: MEDIUM
baseScore: 5.9
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.2
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-143220 // JVNDB: JVNDB-2019-004420 // CNNVD: CNNVD-201905-200 // NVD: CVE-2019-11561

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:CWE-284

Trust: 0.9

sources: VULHUB: VHN-143220 // JVNDB: JVNDB-2019-004420 // NVD: CVE-2019-11561

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201905-200

TYPE

access control error

Trust: 0.6

sources: CNNVD: CNNVD-201905-200

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-004420

PATCH

title:Top Pageurl:http://www.chuango.com/

Trust: 0.8

sources: JVNDB: JVNDB-2019-004420

EXTERNAL IDS

db:NVDid:CVE-2019-11561

Trust: 2.5

db:JVNDBid:JVNDB-2019-004420

Trust: 0.8

db:CNNVDid:CNNVD-201905-200

Trust: 0.7

db:VULHUBid:VHN-143220

Trust: 0.1

sources: VULHUB: VHN-143220 // JVNDB: JVNDB-2019-004420 // CNNVD: CNNVD-201905-200 // NVD: CVE-2019-11561

REFERENCES

url:https://github.com/riiecco/write-ups/tree/master/cve-2019-11561

Trust: 2.5

url:https://nvd.nist.gov/vuln/detail/cve-2019-11561

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11561

Trust: 0.8

sources: VULHUB: VHN-143220 // JVNDB: JVNDB-2019-004420 // CNNVD: CNNVD-201905-200 // NVD: CVE-2019-11561

SOURCES

db:VULHUBid:VHN-143220
db:JVNDBid:JVNDB-2019-004420
db:CNNVDid:CNNVD-201905-200
db:NVDid:CVE-2019-11561

LAST UPDATE DATE

2024-11-23T22:25:56.017000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-143220date:2020-08-24T00:00:00
db:JVNDBid:JVNDB-2019-004420date:2019-05-31T00:00:00
db:CNNVDid:CNNVD-201905-200date:2020-08-25T00:00:00
db:NVDid:CVE-2019-11561date:2024-11-21T04:21:21.170

SOURCES RELEASE DATE

db:VULHUBid:VHN-143220date:2019-05-08T00:00:00
db:JVNDBid:JVNDB-2019-004420date:2019-05-31T00:00:00
db:CNNVDid:CNNVD-201905-200date:2019-05-08T00:00:00
db:NVDid:CVE-2019-11561date:2019-05-08T16:29:00.407