Vulnerability Details CVE-2018-16267
The system-popup system service in Tizen allows an unprivileged process to perform popup-related system actions, due to improper D-Bus security policy configurations. Such actions include the triggering system poweroff menu, and prompting a popup with arbitrary strings. This affects Tizen before 5.0 M1, and Tizen-based firmwares including Samsung Galaxy Gear series before build RE2.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 43.5%
CVSS Severity
CVSS v3 Score 8.1
CVSS v2 Score 4.8
Products affected by CVE-2018-16267
-
cpe:2.3:h:samsung:galaxy_gear:-
-
cpe:2.3:o:linux:tizen:1.0
-
cpe:2.3:o:linux:tizen:2.0
-
cpe:2.3:o:linux:tizen:2.1
-
cpe:2.3:o:linux:tizen:2.2
-
cpe:2.3:o:linux:tizen:2.2.1
-
cpe:2.3:o:linux:tizen:2.3
-
cpe:2.3:o:linux:tizen:2.3.1
-
cpe:2.3:o:linux:tizen:2.4
-
cpe:2.3:o:linux:tizen:3.0
-
cpe:2.3:o:linux:tizen:4.0
-
cpe:2.3:o:linux:tizen:5.0