CVE-2021-27943

The pairing procedure used by the Vizio P65-F1 6.0.31.4-2 and E50x-E1 10.0.31.4-2 Smart TVs and mobile application is vulnerable to a brute-force attack (against only 10000 possibilities), allowing a threat actor to forcefully pair the device, leading to remote control of the TV settings and configurations.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:vizio:p65-f1_firmware:6.0.31.4-2:*:*:*:*:*:*:*
cpe:2.3:h:vizio:p65-f1:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:vizio:e50x-e1_firmware:10.0.31.4-2:*:*:*:*:*:*:*
cpe:2.3:h:vizio:e50x-e1:-:*:*:*:*:*:*:*

History

11 Aug 2021, 14:43

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 7.5
References
  • {'url': 'https://www.l9group.com/advisories/vizio-tv-unauthenticated-remote-code-execution', 'name': 'https://www.l9group.com/advisories/vizio-tv-unauthenticated-remote-code-execution', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://cvecps.mitre.org/cps/workitems/336365/update/', 'name': 'https://cvecps.mitre.org/cps/workitems/336365/update/', 'tags': [], 'refsource': 'MISC'}
  • (MISC) https://www.l9group.com/advisories/vizio-tv-mobile-pairing-is-vulnerable-to-brute-force-attacks - Exploit, Third Party Advisory
References (MISC) https://www.vizio.com - (MISC) https://www.vizio.com - Vendor Advisory
CWE CWE-307
CPE cpe:2.3:o:vizio:e50x-e1_firmware:10.0.31.4-2:*:*:*:*:*:*:*
cpe:2.3:h:vizio:e50x-e1:-:*:*:*:*:*:*:*
cpe:2.3:o:vizio:p65-f1_firmware:6.0.31.4-2:*:*:*:*:*:*:*
cpe:2.3:h:vizio:p65-f1:-:*:*:*:*:*:*:*

05 Aug 2021, 20:15

Type Values Removed Values Added
References
  • (MISC) https://www.l9group.com/advisories/vizio-tv-unauthenticated-remote-code-execution -

02 Aug 2021, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-08-02 21:15

Updated : 2023-12-10 13:55


NVD link : CVE-2021-27943

Mitre link : CVE-2021-27943

CVE.ORG link : CVE-2021-27943


JSON object : View

Products Affected

vizio

  • p65-f1_firmware
  • e50x-e1_firmware
  • p65-f1
  • e50x-e1
CWE
CWE-307

Improper Restriction of Excessive Authentication Attempts