Pebble Smartwatch devices through 4.3 mishandle UUID storage, which allows attackers to read an arbitrary application's flash storage, and access an arbitrary application's JavaScript instance, by modifying a UUID value within the header of a crafted application binary.
References
Link | Resource |
---|---|
https://blog.fletchto99.com/2016/november/pebble-app-sandbox-escape/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2017-11-27 23:29
Updated : 2017-12-20 15:19
NVD link : CVE-2016-10702
Mitre link : CVE-2016-10702
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
pebble
- pebble_firmware
- pebble