CVE-2022-46081

In Garmin Connect 4.61, terminating a LiveTrack session wouldn't prevent the LiveTrack API from continued exposure of private personal information. NOTE: this is disputed by the vendor because the LiveTrack API service is not a customer-controlled product.
Configurations

Configuration 1 (hide)

cpe:2.3:a:garmin:connect:4.61:*:*:*:*:*:*:*

History

21 Nov 2024, 07:30

Type Values Removed Values Added
References () https://www.samwallace.dev/research/Harvesting%20Emails%20with%20Expired%20Garmin%20LiveTrack%20Sessions - Exploit, Third Party Advisory () https://www.samwallace.dev/research/Harvesting%20Emails%20with%20Expired%20Garmin%20LiveTrack%20Sessions - Exploit, Third Party Advisory

07 Nov 2023, 03:55

Type Values Removed Values Added
Summary ** DISPUTED ** In Garmin Connect 4.61, terminating a LiveTrack session wouldn't prevent the LiveTrack API from continued exposure of private personal information. NOTE: this is disputed by the vendor because the LiveTrack API service is not a customer-controlled product. In Garmin Connect 4.61, terminating a LiveTrack session wouldn't prevent the LiveTrack API from continued exposure of private personal information. NOTE: this is disputed by the vendor because the LiveTrack API service is not a customer-controlled product.

Information

Published : 2023-01-04 04:15

Updated : 2024-11-21 07:30


NVD link : CVE-2022-46081

Mitre link : CVE-2022-46081

CVE.ORG link : CVE-2022-46081


JSON object : View

Products Affected

garmin

  • connect
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor