{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T09:10:22.057","vulnerabilities":[{"cve":{"id":"CVE-2021-40526","sourceIdentifier":"cve@mitre.org","published":"2021-10-25T11:15:07.653","lastModified":"2024-11-21T06:24:19.470","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Incorrect calculation of buffer size vulnerability in Peleton TTR01 up to and including PTV55G allows a remote attacker to trigger a Denial of Service attack through the GymKit daemon process by exploiting a heap overflow in the network server handling the Apple GymKit communication. This can lead to an Apple MFI device not being able to authenticate with the Peleton Bike"},{"lang":"es","value":"Una vulnerabilidad de cálculo incorrecto del tamaño del búfer en Peleton TTR01 versiones hasta PTV55G incluyéndola, permite a un atacante remoto desencadenar un ataque de denegación de servicio mediante el proceso daemon de GymKit al explotar un desbordamiento de pila en el servidor de red manejando la comunicación de Apple GymKit. Esto puede conllevar a que un dispositivo Apple MFI no pueda autenticarse con Peleton Bike"}],"metrics":{"cvssMetricV31":[{"source":"cve@mitre.org","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L","baseScore":4.8,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":2.2,"impactScore":2.5},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":3.9,"impactScore":1.4}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-131"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:onepeloton:ttr01_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"ptv55g","matchCriteriaId":"03F84C5A-0ED6-4AD7-A70E-7551E368D37A"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:onepeloton:ttr01:-:*:*:*:*:*:*:*","matchCriteriaId":"430B4497-30D4-493F-B5F4-8EE3DEF09954"}]}]}],"references":[{"url":"https://twitter.com/ROPsicle/status/1438216078103044107?s=20","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"https://twitter.com/ROPsicle/status/1438216078103044107?s=20","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}