In Garmin Connect 4.61, terminating a LiveTrack session wouldn't prevent the LiveTrack API from continued exposure of private personal information. NOTE: this is disputed by the vendor because the LiveTrack API service is not a customer-controlled product.
References
Link | Resource |
---|---|
https://www.samwallace.dev/research/Harvesting%20Emails%20with%20Expired%20Garmin%20LiveTrack%20Sessions | Exploit Third Party Advisory |
https://www.samwallace.dev/research/Harvesting%20Emails%20with%20Expired%20Garmin%20LiveTrack%20Sessions | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 07:30
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.samwallace.dev/research/Harvesting%20Emails%20with%20Expired%20Garmin%20LiveTrack%20Sessions - Exploit, Third Party Advisory |
07 Nov 2023, 03:55
Type | Values Removed | Values Added |
---|---|---|
Summary | In Garmin Connect 4.61, terminating a LiveTrack session wouldn't prevent the LiveTrack API from continued exposure of private personal information. NOTE: this is disputed by the vendor because the LiveTrack API service is not a customer-controlled product. |
Information
Published : 2023-01-04 04:15
Updated : 2024-11-21 07:30
NVD link : CVE-2022-46081
Mitre link : CVE-2022-46081
CVE.ORG link : CVE-2022-46081
JSON object : View
Products Affected
garmin
- connect
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor