CVE-2021-27503

Ypsomed mylife Cloud, mylife Mobile Application, Ypsomed mylife Cloud: All versions prior to 1.7.2, Ypsomed mylife App: All versions prior to 1.7.5,The application encrypts on the application layer of the communication protocol between the Ypsomed mylife App and mylife Cloud credentials based on hard-coded secrets, which allows man-in-the-middle attackers to tamper with messages.
References
Link Resource
https://us-cert.cisa.gov/ics/advisories/icsma-21-196-01 Third Party Advisory US Government Resource
https://us-cert.cisa.gov/ics/advisories/icsma-21-196-01 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ypsomed:mylife:*:*:*:*:*:*:*:*
cpe:2.3:a:ypsomed:mylife_cloud:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:58

Type Values Removed Values Added
References () https://us-cert.cisa.gov/ics/advisories/icsma-21-196-01 - Third Party Advisory, US Government Resource () https://us-cert.cisa.gov/ics/advisories/icsma-21-196-01 - Third Party Advisory, US Government Resource

Information

Published : 2021-08-02 21:15

Updated : 2024-11-21 05:58


NVD link : CVE-2021-27503

Mitre link : CVE-2021-27503

CVE.ORG link : CVE-2021-27503


JSON object : View

Products Affected

ypsomed

  • mylife
  • mylife_cloud
CWE
CWE-798

Use of Hard-coded Credentials