The Xelex MobileTrack application 2.3.7 and earlier for Android uses hardcoded credentials, which allows remote attackers to obtain sensitive information via an unencrypted (1) FTP or (2) HTTP session.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 01:39
Type | Values Removed | Values Added |
---|---|---|
References | () http://blog.mobiledefense.com/2012/05/mobile-defense-finds-two-security-vulnerabilities-in-xelex-mobiletrack/ - | |
References | () http://secunia.com/advisories/49268 - | |
References | () http://www.kb.cert.org/vuls/id/464683 - US Government Resource | |
References | () http://www.securityfocus.com/bid/53634 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/75783 - |
Information
Published : 2012-05-22 15:55
Updated : 2024-11-21 01:39
NVD link : CVE-2012-2567
Mitre link : CVE-2012-2567
CVE.ORG link : CVE-2012-2567
JSON object : View
Products Affected
- android
xelex
- mobiletrack
CWE
CWE-255
Credentials Management Errors