CVE-2020-8989

In the Voatz application 2020-01-01 for Android, the amount of data transmitted during a single voter's vote depends on the different lengths of the metadata across the available voting choices, which makes it easier for remote attackers to discover this voter's choice by sniffing the network. For example, a small amount of sniffed data may indicate that a vote was cast for the candidate with the least metadata. An active man-in-the-middle attacker can leverage this behavior to disrupt voters' abilities to vote for a candidate opposed by the attacker.
Configurations

Configuration 1 (hide)

cpe:2.3:a:voatz:voatz:2020-01-01:*:*:*:*:android:*:*

History

21 Nov 2024, 05:39

Type Values Removed Values Added
References () https://blog.voatz.com/?p=1209 - Vendor Advisory () https://blog.voatz.com/?p=1209 - Vendor Advisory
References () https://internetpolicy.mit.edu/wp-content/uploads/2020/02/SecurityAnalysisOfVoatz_Public.pdf - Third Party Advisory () https://internetpolicy.mit.edu/wp-content/uploads/2020/02/SecurityAnalysisOfVoatz_Public.pdf - Third Party Advisory

Information

Published : 2020-02-13 21:15

Updated : 2024-11-21 05:39


NVD link : CVE-2020-8989

Mitre link : CVE-2020-8989

CVE.ORG link : CVE-2020-8989


JSON object : View

Products Affected

voatz

  • voatz
CWE
CWE-203

Observable Discrepancy