Unnecessary fields in the OpenTrace/BlueTrace protocol in COVIDSafe through v1.0.17 allow a remote attacker to identify a device model by observing cleartext payload data. This allows re-identification of devices, especially less common phone models or those in low-density situations.
References
Link | Resource |
---|---|
https://docs.google.com/document/d/1u5a5ersKBH6eG362atALrzuXo3zuZ70qrGomWVEC27U/edit?usp=sharing | Third Party Advisory |
https://www.health.gov.au/resources/apps-and-tools/covidsafe-app | Product Vendor Advisory |
https://docs.google.com/document/d/1u5a5ersKBH6eG362atALrzuXo3zuZ70qrGomWVEC27U/edit?usp=sharing | Third Party Advisory |
https://www.health.gov.au/resources/apps-and-tools/covidsafe-app | Product Vendor Advisory |
Configurations
History
21 Nov 2024, 05:00
Type | Values Removed | Values Added |
---|---|---|
References | () https://docs.google.com/document/d/1u5a5ersKBH6eG362atALrzuXo3zuZ70qrGomWVEC27U/edit?usp=sharing - Third Party Advisory | |
References | () https://www.health.gov.au/resources/apps-and-tools/covidsafe-app - Product, Vendor Advisory |
Information
Published : 2020-05-18 05:15
Updated : 2024-11-21 05:00
NVD link : CVE-2020-12859
Mitre link : CVE-2020-12859
CVE.ORG link : CVE-2020-12859
JSON object : View
Products Affected
health
- covidsafe
CWE
CWE-312
Cleartext Storage of Sensitive Information