Vulnerability Description
Authentication bypass using an alternate path or channel in SimpliSafe SS3 firmware 1.0-1.3 allows a local, unauthenticated attacker to pair a rogue keypad to an armed system.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Simplisafe | Ss3 Firmware | >= 1.0, <= 1.3 |
| Simplisafe | Ss3 | - |
Related Weaknesses (CWE)
References
- https://www.tenable.com/security/research/tra-2020-03ExploitThird Party Advisory
- https://www.tenable.com/security/research/tra-2020-03ExploitThird Party Advisory
FAQ
What is CVE-2019-3997?
CVE-2019-3997 is a vulnerability with a CVSS score of 4.6 (MEDIUM). Authentication bypass using an alternate path or channel in SimpliSafe SS3 firmware 1.0-1.3 allows a local, unauthenticated attacker to pair a rogue keypad to an armed system.
How severe is CVE-2019-3997?
CVE-2019-3997 has been rated MEDIUM with a CVSS base score of 4.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-3997?
Check the references section above for vendor advisories and patch information. Affected products include: Simplisafe Ss3 Firmware, Simplisafe Ss3.