{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T18:02:17.662","vulnerabilities":[{"cve":{"id":"CVE-2016-6541","sourceIdentifier":"cret@cert.org","published":"2018-07-06T21:29:00.390","lastModified":"2024-11-21T02:56:19.183","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"TrackR Bravo device allows unauthenticated pairing, which enables unauthenticated connected applications to write to various device attributes. Updated apps, version 5.1.6 for iOS and 2.2.5 for Android, have been released by the vendor to address the vulnerabilities in CVE-2016-6538, CVE-2016-6539, CVE-2016-6540 and CVE-2016-6541."},{"lang":"es","value":"EL dispositivo TrackR Bravo permite el emparejamiento no autenticado, lo que permite que las aplicaciones conectadas sin autenticar escriban varios atributos del dispositivo. El fabricante ha publicado las apps actualizadas (5.1.6 para iOS y 2.2.5 para Android) para solucionar las vulnerabilidades en CVE-2016-6538, CVE-2016-6539, CVE-2016-6540 y CVE-2016-6541."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:A/AC:L/Au:N/C:P/I:P/A:P","baseScore":5.8,"accessVector":"ADJACENT_NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":6.5,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"cret@cert.org","type":"Secondary","description":[{"lang":"en","value":"CWE-306"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-287"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:thetrackr:trackr_bravo_firmware:*:*:*:*:*:android:*:*","versionEndExcluding":"2.2.5","matchCriteriaId":"56349B07-D837-41EF-980B-A7AC47519651"},{"vulnerable":true,"criteria":"cpe:2.3:o:thetrackr:trackr_bravo_firmware:*:*:*:*:*:iphone_os:*:*","versionEndExcluding":"5.1.6","matchCriteriaId":"C38B982A-C290-4B65-AE7A-717AB80F4CE2"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:thetrackr:trackr_bravo:-:*:*:*:*:*:*:*","matchCriteriaId":"B4B253B5-5CB1-465C-874C-68EA9AEBA832"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/93874","source":"cret@cert.org","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://blog.rapid7.com/2016/10/25/multiple-bluetooth-low-energy-ble-tracker-vulnerabilities/","source":"cret@cert.org","tags":["Third Party Advisory"]},{"url":"https://www.kb.cert.org/vuls/id/617567","source":"cret@cert.org","tags":["Third Party Advisory","US Government Resource"]},{"url":"https://www.kb.cert.org/vuls/id/TNOY-AF3KCZ","source":"cret@cert.org","tags":["Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/93874","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://blog.rapid7.com/2016/10/25/multiple-bluetooth-low-energy-ble-tracker-vulnerabilities/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://www.kb.cert.org/vuls/id/617567","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"]},{"url":"https://www.kb.cert.org/vuls/id/TNOY-AF3KCZ","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"]}]}}]}