CVE-2023-28647

Nextcloud iOS is an ios application used to interface with the nextcloud home cloud ecosystem. In versions prior to 4.7.0 when an attacker has physical access to an unlocked device, they may enable the integration into the iOS Files app and bypass the Nextcloud pin/password protection and gain access to a users files. It is recommended that the Nextcloud iOS app is upgraded to 4.7.0. There are no known workarounds for this vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:nextcloud:nextcloud:*:*:*:*:*:iphone_os:*:*

History

21 Nov 2024, 07:55

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 6.8
v2 : unknown
v3 : 4.4
References () https://github.com/nextcloud/ios/pull/2344 - Patch () https://github.com/nextcloud/ios/pull/2344 - Patch
References () https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wjgg-2v4p-2gq6 - Vendor Advisory () https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wjgg-2v4p-2gq6 - Vendor Advisory

Information

Published : 2023-03-30 19:15

Updated : 2024-11-21 07:55


NVD link : CVE-2023-28647

Mitre link : CVE-2023-28647

CVE.ORG link : CVE-2023-28647


JSON object : View

Products Affected

nextcloud

  • nextcloud
CWE
CWE-281

Improper Preservation of Permissions

CWE-287

Improper Authentication

NVD-CWE-noinfo