Session 1.13.0 allows an attacker with physical access to the victim's device to bypass the application's password/pin lock to access user data. This is possible due to lack of adequate security controls to prevent dynamic code manipulation.
References
Link | Resource |
---|---|
https://fluidattacks.com/advisories/tempest/ | Exploit Issue Tracking Third Party Advisory |
https://github.com/oxen-io/session-android | Product Third Party Advisory |
https://github.com/oxen-io/session-android/pull/897 | Exploit Issue Tracking Third Party Advisory |
https://fluidattacks.com/advisories/tempest/ | Exploit Issue Tracking Third Party Advisory |
https://github.com/oxen-io/session-android | Product Third Party Advisory |
https://github.com/oxen-io/session-android/pull/897 | Exploit Issue Tracking Third Party Advisory |
Configurations
History
21 Nov 2024, 06:41
Type | Values Removed | Values Added |
---|---|---|
References | () https://fluidattacks.com/advisories/tempest/ - Exploit, Issue Tracking, Third Party Advisory | |
References | () https://github.com/oxen-io/session-android - Product, Third Party Advisory | |
References | () https://github.com/oxen-io/session-android/pull/897 - Exploit, Issue Tracking, Third Party Advisory |
Information
Published : 2022-06-30 16:15
Updated : 2024-11-21 06:41
NVD link : CVE-2022-1955
Mitre link : CVE-2022-1955
CVE.ORG link : CVE-2022-1955
JSON object : View
Products Affected
opft
- session
CWE
CWE-287
Improper Authentication