The TrackR Bravo mobile app stores the account password used to authenticate to the cloud API in cleartext in the cache.db file. Updated apps, version 5.1.6 for iOS and 2.2.5 for Android, have been released by the vendor to address the vulnerabilities in CVE-2016-6538, CVE-2016-6539, CVE-2016-6540 and CVE-2016-6541.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/93874 | Third Party Advisory VDB Entry |
https://blog.rapid7.com/2016/10/25/multiple-bluetooth-low-energy-ble-tracker-vulnerabilities/ | Exploit Third Party Advisory |
https://www.kb.cert.org/vuls/id/617567 | Third Party Advisory US Government Resource |
https://www.kb.cert.org/vuls/id/TNOY-AF3KCZ | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2018-07-06 21:29
Updated : 2024-02-04 19:46
NVD link : CVE-2016-6538
Mitre link : CVE-2016-6538
CVE.ORG link : CVE-2016-6538
JSON object : View
Products Affected
thetrackr
- trackr_bravo_firmware
- trackr_bravo