Products
Smart-tab Android app
- April 2023 or earlier
Source
vultures@jpcert.or.jp
Tags
CVE-2024-42496 details
Published : Sept. 30, 2024, 8:15 a.m.
Last Modified : Sept. 30, 2024, 12:45 p.m.
Last Modified : Sept. 30, 2024, 12:45 p.m.
Description
Smart-tab Android app installed April 2023 or earlier contains an issue with plaintext storage of a password. If this vulnerability is exploited, an attacker with physical access to the device may retrieve the credential information and spoof the device to access the related external service.
CVSS Score
1 | 2.4 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|---|---|
CWE-256 | Plaintext Storage of a Password | Storing a password in plaintext may result in a system compromise. |
CVSS Data
Attack Vector
PHYSICAL
Attack Complexity
LOW
Privileges Required
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
Base Score
2.4
Exploitability Score
0.9
Impact Score
1.4
Base Severity
LOW
Vector String : CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
References
URL | Source |
---|---|
https://jvn.jp/en/jp/JVN42445661/ | vultures@jpcert.or.jp |
https://tsc-soft.co.jp/smart-tab/ | vultures@jpcert.or.jp |
This website uses the NVD API, but is not approved or certified by it.