Android App ‘MyPallete’ and some of the Android banking applications based on ‘MyPallete’ do not verify X.509 certificates from servers, and also do not properly validate certificates with host-mismatch, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[
{
"product": "'MyPallete' and some of the Android banking applications that use 'MyPallete'",
"vendor": "NTT Data Corporation",
"versions": [
{
"status": "affected",
"version": "MyPallete all versions, AshikagaBankingAppli ver1.0.4 and earlier, SENSHUIKEDABANKBankingAppli ver3.0.4 and earlier, ShikokuBankingAppli ver2.0.1 and earlier, TohokuBankingAppli ver1.0.1 and earlier, NaganoBankingAppli ver1.0.1 and earlier, 77BankingAppli ver2.0.1 and earlier, HokkaidoBankingAppli ver3.0.1 and earlier, and HokurikuBankingAppli ver2.0.1 and earlier"
}
]
}
]
jvn.jp/en/jp/JVN28845872/index.html
www.dokodemobank.ne.jp/info_20200128_bankingapp.html
www.77bank.co.jp/pdf/oshirase/20012801_appvulnerability.pdf
www.ashikagabank.co.jp/appbanking/pdf/oshirase.pdf
www.hokkaidobank.co.jp/common/dat/2020/0120/15795047141946146699.pdf
www.hokugin.co.jp/info/archives/personal/2020/1913.html
www.naganobank.co.jp/soshiki/2/app-ssl.html
www.shikokubank.co.jp/info/apps20200128.html
www.sihd-bk.jp/common_v2/pdf/20200127.pdf
www.tohoku-bank.co.jp/news/topics/200128_applissl.html