Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:360:360f5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D523167D-CA4B-45D9-A6A5-93107E0182DF", "versionEndIncluding": "3.1.3.64296", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:360:360f5:-:*:*:*:*:*:*:*", "matchCriteriaId": "35BE7932-8FB6-4FF8-9E09-AF31F3616C98", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "descriptions": [{"lang": "en", "value": "In the 3.1.3.64296 and lower version of 360F5, the third party can trigger the device to send a deauth frame by constructing and sending a specific illegal 802.11 Null Data Frame, which will cause other wireless terminals connected to disconnect from the wireless, so as to attack the router wireless by DoS. At present, the vulnerability has been effectively handled, and users can fix the vulnerability after updating the firmware version."}, {"lang": "es", "value": "En la versi\u00f3n 3.1.3.64296 y versi\u00f3n inferior de 360F5, los terceros pueden activar el dispositivo para enviar una trama de autenticaci\u00f3n mediante la construcci\u00f3n y el env\u00edo de un 802.11 Null Data Frame ilegal espec\u00edfico, lo que causar\u00e1 que otros terminales inal\u00e1mbricos conectados se desconecten de la red inal\u00e1mbrica, que es atacar el enrutador inal\u00e1mbrico mediante una DoS. En la actualidad, la vulnerabilidad se ha manejado de manera eficaz y los usuarios pueden corregirla despu\u00e9s de actualizar la versi\u00f3n del firmware"}], "id": "CVE-2019-3405", "lastModified": "2024-11-21T04:42:02.567", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1"}, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2021-01-11T16:15:14.350", "references": [{"source": "security@360.cn", "tags": ["Vendor Advisory"], "url": "https://security.360.cn/News/news/id/246"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://security.360.cn/News/news/id/246"}], "sourceIdentifier": "security@360.cn", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "NVD-CWE-noinfo"}], "source": "nvd@nist.gov", "type": "Primary"}]}