← Back to CVEs
CVE-2020-16169
CRITICAL9.8
Description
Authentication Bypass Using an Alternate Path or Channel in temi Robox OS prior to120, temi Android app up to 1.3.7931 allows remote attackers to gain elevated privileges on the temi and have it automatically answer the attacker's calls, granting audio, video, and motor control via unspecified vectors.
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published8/7/2020
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
robotemi:robox_os
Weaknesses (CWE)
CWE-287
References
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/call-an-exorcist-my-robots-possessed/(cve@mitre.org)
https://www.robotemi.com/software-updates/(cve@mitre.org)
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/call-an-exorcist-my-robots-possessed/(af854a3a-2127-422b-91ae-364da2661108)
https://www.robotemi.com/software-updates/(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.