The Vibease Wireless Remote Vibrator app for Android and the Vibease Chat app for iOS use cleartext to exchange messages with other apps and the PLAIN SASL mechanism to send auth tokens to Vibease servers, which allows remote attackers to obtain user credentials, messages, and other sensitive information by sniffing the network for XMPP traffic.
References
Link | Resource |
---|---|
https://dl.acm.org/citation.cfm?id=3139942&preflayout=flat | Third Party Advisory |
https://dl.acm.org/citation.cfm?id=3139942&preflayout=flat | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:12
Type | Values Removed | Values Added |
---|---|---|
References | () https://dl.acm.org/citation.cfm?id=3139942&preflayout=flatĀ - Third Party Advisory |
Information
Published : 2017-12-01 17:29
Updated : 2024-11-21 03:12
NVD link : CVE-2017-14486
Mitre link : CVE-2017-14486
CVE.ORG link : CVE-2017-14486
JSON object : View
Products Affected
vibease
- wireless_remote_vibrator
- chat
CWE
CWE-319
Cleartext Transmission of Sensitive Information