CVE-2022-0732

The backend infrastructure shared by multiple mobile device monitoring services does not adequately authenticate or authorize API requests, creating an IDOR (Insecure Direct Object Reference) vulnerability.
References
Link Resource
https://cwe.mitre.org/data/definitions/284.html Not Applicable
https://kb.cert.org/vuls/id/229438 Third Party Advisory US Government Resource
https://techcrunch.com/2022/02/22/stalkerware-network-spilling-data/ Press/Media Coverage Third Party Advisory
https://www.kb.cert.org/vuls/id/229438 Third Party Advisory US Government Resource
https://cwe.mitre.org/data/definitions/284.html Not Applicable
https://kb.cert.org/vuls/id/229438 Third Party Advisory US Government Resource
https://techcrunch.com/2022/02/22/stalkerware-network-spilling-data/ Press/Media Coverage Third Party Advisory
https://www.kb.cert.org/vuls/id/229438 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:1byte:copy9:-:*:*:*:*:*:*:*
cpe:2.3:a:1byte:exactspy:-:*:*:*:*:*:*:*
cpe:2.3:a:1byte:fonetracker:-:*:*:*:*:*:*:*
cpe:2.3:a:1byte:guestspy:-:*:*:*:*:*:*:*
cpe:2.3:a:1byte:ispyoo:-:*:*:*:*:*:*:*
cpe:2.3:a:1byte:mxspy:-:*:*:*:*:*:*:*
cpe:2.3:a:1byte:secondclone:-:*:*:*:*:*:*:*
cpe:2.3:a:1byte:the_truth_spy:-:*:*:*:*:*:*:*
cpe:2.3:a:1byte:thespyapp:-:*:*:*:*:*:*:*

History

21 Nov 2024, 06:39

Type Values Removed Values Added
References () https://cwe.mitre.org/data/definitions/284.html - Not Applicable () https://cwe.mitre.org/data/definitions/284.html - Not Applicable
References () https://kb.cert.org/vuls/id/229438 - Third Party Advisory, US Government Resource () https://kb.cert.org/vuls/id/229438 - Third Party Advisory, US Government Resource
References () https://techcrunch.com/2022/02/22/stalkerware-network-spilling-data/ - Press/Media Coverage, Third Party Advisory () https://techcrunch.com/2022/02/22/stalkerware-network-spilling-data/ - Press/Media Coverage, Third Party Advisory
References () https://www.kb.cert.org/vuls/id/229438 - Third Party Advisory, US Government Resource () https://www.kb.cert.org/vuls/id/229438 - Third Party Advisory, US Government Resource

27 Jun 2023, 18:11

Type Values Removed Values Added
CWE CWE-863 CWE-639

08 Mar 2022, 15:54

Type Values Removed Values Added
References (CONFIRM) https://techcrunch.com/2022/02/22/stalkerware-network-spilling-data/ - (CONFIRM) https://techcrunch.com/2022/02/22/stalkerware-network-spilling-data/ - Press/Media Coverage, Third Party Advisory
References (CERT-VN) https://kb.cert.org/vuls/id/229438 - (CERT-VN) https://kb.cert.org/vuls/id/229438 - Third Party Advisory, US Government Resource
References (CERT-VN) https://www.kb.cert.org/vuls/id/229438 - (CERT-VN) https://www.kb.cert.org/vuls/id/229438 - Third Party Advisory, US Government Resource
References (MISC) https://cwe.mitre.org/data/definitions/284.html - (MISC) https://cwe.mitre.org/data/definitions/284.html - Not Applicable
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 7.5
CWE CWE-863
CPE cpe:2.3:a:1byte:the_truth_spy:-:*:*:*:*:*:*:*
cpe:2.3:a:1byte:copy9:-:*:*:*:*:*:*:*
cpe:2.3:a:1byte:thespyapp:-:*:*:*:*:*:*:*
cpe:2.3:a:1byte:ispyoo:-:*:*:*:*:*:*:*
cpe:2.3:a:1byte:exactspy:-:*:*:*:*:*:*:*
cpe:2.3:a:1byte:mxspy:-:*:*:*:*:*:*:*
cpe:2.3:a:1byte:fonetracker:-:*:*:*:*:*:*:*
cpe:2.3:a:1byte:guestspy:-:*:*:*:*:*:*:*
cpe:2.3:a:1byte:secondclone:-:*:*:*:*:*:*:*

25 Feb 2022, 20:15

Type Values Removed Values Added
References
  • (CERT-VN) https://www.kb.cert.org/vuls/id/229438 -

24 Feb 2022, 16:34

Type Values Removed Values Added
New CVE

Information

Published : 2022-02-24 16:15

Updated : 2024-11-21 06:39


NVD link : CVE-2022-0732

Mitre link : CVE-2022-0732

CVE.ORG link : CVE-2022-0732


JSON object : View

Products Affected

1byte

  • fonetracker
  • secondclone
  • the_truth_spy
  • exactspy
  • thespyapp
  • guestspy
  • copy9
  • ispyoo
  • mxspy
CWE
CWE-284

Improper Access Control

CWE-639

Authorization Bypass Through User-Controlled Key