Lucene search

K
nextcloudNextcloudGHSA-WVR4-GC4C-6VMX
HistoryJan 09, 2023 - 5:50 a.m.

Passcode bypass on Talk Android app

2023-01-0905:50:02
github.com
14
passcode bypass
nextcloud
android
security advisory
hackerone
pullrequest

2.1 Low

CVSS3

Attack Vector

PHYSICAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N

0.001 Low

EPSS

Percentile

25.0%

Description

Impact

To exploit this the attacker needs to have a physical access to the target’s device.
Due to the bypass of passcode an attacker is able to access the user’s Nextcloud files and view conversations.

Patches

It is recommended that the Nextcloud Talk Android app is upgraded to 15.0.2

Workarounds

No workaround available

References

For more information

If you have any questions or comments about this advisory:

CPENameOperatorVersion
talk androidlt15.0.2

2.1 Low

CVSS3

Attack Vector

PHYSICAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N

0.001 Low

EPSS

Percentile

25.0%

Related for GHSA-WVR4-GC4C-6VMX