CVE-2024-23453

Android Spoon application version 7.11.1 to 8.6.0 uses hard-coded credentials, which may allow a local attacker to retrieve the hard-coded API key when the application binary is reverse-engineered. This API key may be used for unexpected access of the associated service.
Configurations

Configuration 1 (hide)

cpe:2.3:a:spooncast:spoon:*:*:*:*:*:android:*:*

History

29 Jan 2024, 22:58

Type Values Removed Values Added
References () https://play.google.com/store/apps/details?id=co.spoonme&hl=en_US - () https://play.google.com/store/apps/details?id=co.spoonme&hl=en_US - Product
References () https://jvn.jp/en/jp/JVN96154238/ - () https://jvn.jp/en/jp/JVN96154238/ - Third Party Advisory
References () https://spoon-support.spooncast.net/jp/update - () https://spoon-support.spooncast.net/jp/update - Vendor Advisory
CWE CWE-798
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:a:spooncast:spoon:*:*:*:*:*:android:*:*

24 Jan 2024, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-24 00:15

Updated : 2024-02-05 00:22


NVD link : CVE-2024-23453

Mitre link : CVE-2024-23453

CVE.ORG link : CVE-2024-23453


JSON object : View

Products Affected

spooncast

  • spoon
CWE
CWE-798

Use of Hard-coded Credentials