CVE-2017-14486

The Vibease Wireless Remote Vibrator app for Android and the Vibease Chat app for iOS use cleartext to exchange messages with other apps and the PLAIN SASL mechanism to send auth tokens to Vibease servers, which allows remote attackers to obtain user credentials, messages, and other sensitive information by sniffing the network for XMPP traffic.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:vibease:chat:-:*:*:*:*:iphone_os:*:*
cpe:2.3:a:vibease:wireless_remote_vibrator:-:*:*:*:*:android:*:*

History

21 Nov 2024, 03:12

Type Values Removed Values Added
References () https://dl.acm.org/citation.cfm?id=3139942&preflayout=flatĀ - Third Party Advisory () https://dl.acm.org/citation.cfm?id=3139942&preflayout=flatĀ - Third Party Advisory

Information

Published : 2017-12-01 17:29

Updated : 2024-11-21 03:12


NVD link : CVE-2017-14486

Mitre link : CVE-2017-14486

CVE.ORG link : CVE-2017-14486


JSON object : View

Products Affected

vibease

  • wireless_remote_vibrator
  • chat
CWE
CWE-319

Cleartext Transmission of Sensitive Information