5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
0.004 Low
EPSS
Percentile
74.3%
The TigerText Free Consumer Private Texting App (iOS) sends unencrypted user information to TigerText support.
The TigerText app generates an unencrypted log file containing the TigerText username and password on the device when a user taps on “Contact Customer Support.” An email is generated to support that sends the log information with it. This does not impact the TigerText Pro application.
TigerText usernames and passwords may be viewable by TigerText support or others with access to the device or email. A recipient of the email containing the log file could use credentials to impersonate the user, gaining unauthorized access to any non-expired messages.
Apply an Update
An updated app is available from the iTunes App Store. Version 3.1.402 or above contains a patch that removes sensitive information from the log file. The latest version is available here: <https://itunes.apple.com/us/app/tiger-text/id355832697?mt=8>
704916
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Notified: February 07, 2013 Updated: March 18, 2013
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Group | Score | Vector |
---|---|---|
Base | 1.7 | AV:L/AC:L/Au:S/C:P/I:N/A:N |
Temporal | 1.4 | E:F/RL:OF/RC:C |
Environmental | 0.4 | CDP:N/TD:L/CR:ND/IR:ND/AR:ND |
Thanks to Pedro Paixao for reporting this vulnerability.
This document was written by Chris King.
CVE IDs: | CVE-2013-0128 |
---|---|
Date Public: | 2013-04-02 Date First Published: |