6.5
CVSSv2

CVE-2015-8269

Published: 04/02/2016 Updated: 24/02/2016
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 7.5 | Impact Score: 5.9 | Exploitability Score: 1.6
VMScore: 580
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

The API on Fisher-Price Smart Toy Bear devices allows remote malicious users to obtain sensitive information or modify data by leveraging presence in an 802.11 network's coverage area and entering an account number.

Vulnerable Product Search on Vulmon Subscribe to Product

fisher-price smart toy bear

Github Repositories

Awesome IoT Hacks A curated list of hacks in IoT space so that researchers and industrial products can address the security vulnerabilities (hopefully) The table of content is generated with doctoc Make sure you run it and update the table of content before making pull requests Contents Analysis, Reports and Slides Communities IoT Hacks Thingbots RFID Home Automation Con

Hardware Hacking and IoT Awesome by Joas My Social Networks wwwlinkedincom/in/joas-antonio-dos-santos twittercom/C0d3Cr4zy drivegooglecom/drive/u/0/folders/12Mvq6kE2HJDwN2CZhEGWizyWt87YunkU Awesome Embedded and IoT Security githubcom/fkie-cad/awesome-embedded-and-iot-security Software Tools Analysis Frameworks EXPLIoT - Pentest framework

A Collection of Hacks in IoT Space so that we can address them (hopefully).

Awesome IoT Hacks A curated list of hacks in IoT space so that researchers and industrial products can address the security vulnerabilities (hopefully) The table of content is generated with doctoc Make sure you run it and update the table of content before making pull requests Contents Analysis, Reports and Slides Communities IoT Hacks Thingbots RFID Home Automation Con

Demonstrate skills in creating, implementing & maintaining virtual machines: Windows OS, Kali & Ubuntu for both attack and victim machines.

IoT-PenTesting-Research- Demonstrate skills in creating, implementing & maintaining virtual machines: Windows OS, Kali & Ubuntu for both attack and victim machines Contents Analysis, Reports and Slides Communities IoT Hacks Thingbots RFID Home Automation Connected Doorbell Hub Smart Coffee Wearable Smart Plug Cameras Traffic Lights Automobiles Airplanes Lig

Awesome IoT Hacks A curated list of hacks in IoT space so that researchers and industrial products can address the security vulnerabilities (hopefully) The table of content is generated with doctoc Make sure you run it and update the table of content before making pull requests Contents Analysis, Reports and Slides Communities IoT Hacks Thingbots RFID Home Automation Con

Awesome IoT Hacks A curated list of hacks in IoT space so that researchers and industrial products can address the security vulnerabilities (hopefully) The table of content is generated with doctoc Make sure you run it and update the table of content before making pull requests Contents Analysis, Reports and Slides Communities IoT Hacks Thingbots RFID Home Automation Con

Awesome IoT Hacks A curated list of hacks in IoT space so that researchers and industrial products can address the security vulnerabilities (hopefully) The table of content is generated with doctoc Make sure you run it and update the table of content before making pull requests Contents Analysis, Reports and Slides Communities IoT Hacks Thingbots RFID Home Automation Con