4.6
CVSSv3

CVE-2015-4400

Published: 06/02/2018 Updated: 13/03/2018
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 4.6 | Impact Score: 3.6 | Exploitability Score: 0.9
VMScore: 189
Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

Ring (formerly DoorBot) video doorbells allow remote malicious users to obtain sensitive information about the wireless network configuration by pressing the set up button and leveraging an API in the GainSpan Wi-Fi module.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

ring ring_firmware -

Github Repositories

Awesome IoT Hacks A curated list of hacks in IoT space so that researchers and industrial products can address the security vulnerabilities (hopefully) The table of content is generated with doctoc Make sure you run it and update the table of content before making pull requests Contents Analysis, Reports and Slides Communities IoT Hacks Thingbots RFID Home Automation Con

Hardware Hacking and IoT Awesome by Joas My Social Networks wwwlinkedincom/in/joas-antonio-dos-santos twittercom/C0d3Cr4zy drivegooglecom/drive/u/0/folders/12Mvq6kE2HJDwN2CZhEGWizyWt87YunkU Awesome Embedded and IoT Security githubcom/fkie-cad/awesome-embedded-and-iot-security Software Tools Analysis Frameworks EXPLIoT - Pentest framework

A Collection of Hacks in IoT Space so that we can address them (hopefully).

Awesome IoT Hacks A curated list of hacks in IoT space so that researchers and industrial products can address the security vulnerabilities (hopefully) The table of content is generated with doctoc Make sure you run it and update the table of content before making pull requests Contents Analysis, Reports and Slides Communities IoT Hacks Thingbots RFID Home Automation Con

Demonstrate skills in creating, implementing & maintaining virtual machines: Windows OS, Kali & Ubuntu for both attack and victim machines.

IoT-PenTesting-Research- Demonstrate skills in creating, implementing & maintaining virtual machines: Windows OS, Kali & Ubuntu for both attack and victim machines Contents Analysis, Reports and Slides Communities IoT Hacks Thingbots RFID Home Automation Connected Doorbell Hub Smart Coffee Wearable Smart Plug Cameras Traffic Lights Automobiles Airplanes Lig

Awesome IoT Hacks A curated list of hacks in IoT space so that researchers and industrial products can address the security vulnerabilities (hopefully) The table of content is generated with doctoc Make sure you run it and update the table of content before making pull requests Contents Analysis, Reports and Slides Communities IoT Hacks Thingbots RFID Home Automation Con

Awesome IoT Hacks A curated list of hacks in IoT space so that researchers and industrial products can address the security vulnerabilities (hopefully) The table of content is generated with doctoc Make sure you run it and update the table of content before making pull requests Contents Analysis, Reports and Slides Communities IoT Hacks Thingbots RFID Home Automation Con

Awesome IoT Hacks A curated list of hacks in IoT space so that researchers and industrial products can address the security vulnerabilities (hopefully) The table of content is generated with doctoc Make sure you run it and update the table of content before making pull requests Contents Analysis, Reports and Slides Communities IoT Hacks Thingbots RFID Home Automation Con