Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:asus:hg100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C6475F7-122A-4D65-8191-9B4A537FB1DB", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:asus:hg100:-:*:*:*:*:*:*:*", "matchCriteriaId": "DFEFB004-6477-408B-A114-8ABCA8AC8D19", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:asus:mw100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2B477A45-4E68-46B2-80F5-30B0F230EB25", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:asus:mw100:-:*:*:*:*:*:*:*", "matchCriteriaId": "6BA0BD66-6D94-43EF-BF10-8876E1B57EDD", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:asus:ws-101_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D2C3A04B-F863-4AB3-A6CA-692740E4F54C", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:asus:ws-101:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED316BAF-834B-4DE0-9F57-58DCF2A2B173", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:asus:ts-101_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F1C7AC1-C698-4F5B-A556-327A66A0A8E3", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:asus:ts-101:-:*:*:*:*:*:*:*", "matchCriteriaId": "FAF8B970-AB76-47D7-B43A-C802643A0646", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:asus:as-101_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6394F3BE-8032-40A5-B534-9FF62709BEC7", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:asus:as-101:-:*:*:*:*:*:*:*", "matchCriteriaId": "D3950E49-F5A9-412B-94AB-258A87BBD965", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:asus:ms-101_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "70CAEAA8-DCB8-4154-A9D6-F4EFC11C2D4A", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:asus:ms-101:-:*:*:*:*:*:*:*", "matchCriteriaId": "2839A31C-D770-44D8-943C-160AEAD2701E", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:asus:dl-101_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4434E4C0-D531-4485-B20F-1513B3D0E902", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:asus:dl-101:-:*:*:*:*:*:*:*", "matchCriteriaId": "1875F5A1-2C3A-494E-B657-1730B8415735", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "descriptions": [{"lang": "en", "value": "An issue was discovered on ASUS HG100, MW100, WS-101, TS-101, AS-101, MS-101, DL-101 devices using ZigBee PRO. Because of insecure key transport in ZigBee communication, attackers can obtain sensitive information, cause the multiple denial of service attacks, take over smart home devices, and tamper with messages."}, {"lang": "es", "value": "Se descubri\u00f3 un problema en los dispositivos ASUS HG100, MW100, WS-101, TS-101, AS-101, MS-101, DL-101 que usan ZigBee PRO. Debido al transporte inseguro de claves en la comunicaci\u00f3n de ZigBee, los atacantes pueden obtener informaci\u00f3n confidencial, provocar m\u00faltiples ataques de denegaci\u00f3n de servicio, hacerse cargo de dispositivos dom\u00e9sticos inteligentes y manipular los mensajes."}], "id": "CVE-2019-15911", "lastModified": "2024-11-21T04:29:42.660", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2019-12-20T17:15:11.347", "references": [{"source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"], "url": "https://github.com/chengcheng227/CVE-POC/blob/master/CVE-2019-15911.md"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"], "url": "https://github.com/chengcheng227/CVE-POC/blob/master/CVE-2019-15911.md"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-319"}], "source": "nvd@nist.gov", "type": "Primary"}]}