The National Payments Corporation of India BHIM application 1.3 for Android relies on a four-digit passcode, which makes it easier for attackers to obtain access.
References
Link | Resource |
---|---|
https://github.com/magicj3lly/appexploits/blob/master/BHIM-App-PreliminaryReport.pdf | Broken Link |
https://exchange.xforce.ibmcloud.com/vulnerabilities/148927 | Third Party Advisory |
https://github.com/magicj3lly/appexploits/blob/master/BHIM-App-PreliminaryReport.pdf | Broken Link |
Configurations
History
21 Nov 2024, 03:36
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/magicj3lly/appexploits/blob/master/BHIM-App-PreliminaryReport.pdf - Broken Link |
Information
Published : 2018-08-24 21:29
Updated : 2024-11-21 03:36
NVD link : CVE-2017-9818
Mitre link : CVE-2017-9818
CVE.ORG link : CVE-2017-9818
JSON object : View
Products Affected
npci
- bharat_interface_for_money_\(bhim\)
CWE
CWE-521
Weak Password Requirements