Lucene search

K
cvelistRapid7CVELIST:CVE-2019-5627
HistoryMay 22, 2019 - 6:12 p.m.

CVE-2019-5627 BlueCats Reveal iOS App Insecure Storage

2019-05-2218:12:01
CWE-922
rapid7
www.cve.org

2.8 Low

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N

7.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

25.8%

The iOS mobile application BlueCats Reveal before 5.14 stores the username and password in the app cache as base64 encoded strings, i.e. clear text. These persist in the cache even if the user logs out. This can allow an attacker to compromise the affected BlueCats network implementation. The attacker would first need to gain physical control of the iOS device or compromise it with a malicious app.

CNA Affected

[
  {
    "product": "Reveal",
    "vendor": "BlueCats",
    "versions": [
      {
        "status": "affected",
        "version": "before 5.14"
      }
    ]
  }
]

2.8 Low

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N

7.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

25.8%

Related for CVELIST:CVE-2019-5627