Amazon Echo Dot devices through 2021-07-02 sometimes allow attackers, who have physical access to a device after a factory reset, to obtain sensitive information via a series of complex hardware and software attacks. NOTE: reportedly, there were vendor marketing statements about safely removing personal content via a factory reset. Also, the vendor has reportedly indicated that they are working on mitigations.
References
Link | Resource |
---|---|
https://arstechnica.com/gadgets/2021/07/passwords-in-amazon-echo-dots-live-on-even-after-you-factory-reset-them/ | Third Party Advisory |
https://dl.acm.org/doi/pdf/10.1145/3448300.3467820 | Technical Description Third Party Advisory |
https://www.cpomagazine.com/data-privacy/is-it-possible-to-make-iot-devices-private-amazon-echo-dot-does-not-wipe-personal-content-after-factory-reset/ | Third Party Advisory |
https://news.ycombinator.com/item?id=27943730 | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2021-07-24 16:15
Updated : 2021-08-09 10:26
NVD link : CVE-2021-37436
Mitre link : CVE-2021-37436
JSON object : View
CWE
Products Affected
amazon
- echo_dot_firmware
- echo_dot