Vulnerability Details CVE-2018-16272
The wpa_supplicant system service in Samsung Galaxy Gear series allows an unprivileged process to fully control the Wi-Fi interface, due to the lack of its D-Bus security policy configurations. This affects Tizen-based firmwares including Samsung Galaxy Gear series before build RE2.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.004
EPSS Ranking 57.5%
CVSS Severity
CVSS v3 Score 9.8
CVSS v2 Score 7.5
Products affected by CVE-2018-16272
-
cpe:2.3:h:samsung:galaxy_gear:-
-
cpe:2.3:h:samsung:gear_2:-
-
cpe:2.3:h:samsung:gear_fit:-
-
cpe:2.3:h:samsung:gear_fit_2:-
-
cpe:2.3:h:samsung:gear_fit_2_pro:-
-
cpe:2.3:h:samsung:gear_live:-
-
cpe:2.3:h:samsung:gear_s2:-
-
cpe:2.3:h:samsung:gear_s3:-
-
cpe:2.3:h:samsung:gear_s:-
-
cpe:2.3:h:samsung:gear_sport:-
-
cpe:2.3:o:samsung:galaxy_gear_firmware:-
-
cpe:2.3:o:samsung:gear_2_firmware:-
-
cpe:2.3:o:samsung:gear_2_firmware:5.5
-
cpe:2.3:o:samsung:gear_fit_2_firmware:-
-
cpe:2.3:o:samsung:gear_fit_2_pro_firmware:-
-
cpe:2.3:o:samsung:gear_fit_firmware:-
-
cpe:2.3:o:samsung:gear_live_firmware:-
-
cpe:2.3:o:samsung:gear_s2_firmware:-
-
cpe:2.3:o:samsung:gear_s2_firmware:5.5
-
cpe:2.3:o:samsung:gear_s3_firmware:-
-
cpe:2.3:o:samsung:gear_s3_firmware:5.5
-
cpe:2.3:o:samsung:gear_s_firmware:-
-
cpe:2.3:o:samsung:gear_s_firmware:5.5
-
cpe:2.3:o:samsung:gear_sport_firmware:-