CVE-2020-25493

Oclean Mobile Application 2.1.2 communicates with an external website using HTTP so it is possible to eavesdrop the network traffic. The content of HTTP payload is encrypted using XOR with a hardcoded key, which allows for the possibility to decode the traffic.
Configurations

Configuration 1 (hide)

cpe:2.3:a:oclean:oclean:2.1.2:*:*:*:*:*:*:*

History

21 Nov 2024, 05:18

Type Values Removed Values Added
References () http://oclean.com - Product () http://oclean.com - Product
References () https://github.com/c3r34lk1ll3r/decrypt-oclean-traffic - Exploit, Third Party Advisory () https://github.com/c3r34lk1ll3r/decrypt-oclean-traffic - Exploit, Third Party Advisory
References () https://play.google.com/store/apps/details?id=com.yunding.noopsychebrushforeign - Product () https://play.google.com/store/apps/details?id=com.yunding.noopsychebrushforeign - Product

Information

Published : 2021-02-11 18:15

Updated : 2024-11-21 05:18


NVD link : CVE-2020-25493

Mitre link : CVE-2020-25493

CVE.ORG link : CVE-2020-25493


JSON object : View

Products Affected

oclean

  • oclean
CWE
CWE-327

Use of a Broken or Risky Cryptographic Algorithm

CWE-798

Use of Hard-coded Credentials