Ypsomed mylife Cloud, mylife Mobile Application, Ypsomed mylife Cloud: All versions prior to 1.7.2, Ypsomed mylife App: All versions prior to 1.7.5,The application encrypts on the application layer of the communication protocol between the Ypsomed mylife App and mylife Cloud credentials based on hard-coded secrets, which allows man-in-the-middle attackers to tamper with messages.
References
Link | Resource |
---|---|
https://us-cert.cisa.gov/ics/advisories/icsma-21-196-01 | Third Party Advisory US Government Resource |
https://us-cert.cisa.gov/ics/advisories/icsma-21-196-01 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:58
Type | Values Removed | Values Added |
---|---|---|
References | () https://us-cert.cisa.gov/ics/advisories/icsma-21-196-01 - Third Party Advisory, US Government Resource |
Information
Published : 2021-08-02 21:15
Updated : 2024-11-21 05:58
NVD link : CVE-2021-27503
Mitre link : CVE-2021-27503
CVE.ORG link : CVE-2021-27503
JSON object : View
Products Affected
ypsomed
- mylife
- mylife_cloud
CWE
CWE-798
Use of Hard-coded Credentials