Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2gfr-hjcw-mr7q

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 5.9

Описание

** DISPUTED ** An issue was discovered in the GAEN (aka Google/Apple Exposure Notifications) protocol through 2020-10-05, as used in COVID-19 applications on Android and iOS. The encrypted metadata block with a TX value lacks a checksum, allowing bitflipping to amplify a contamination attack. This can cause metadata deanonymization and risk-score inflation. NOTE: the vendor's position is "We do not believe that TX power authentication would be a useful defense against relay attacks."

** DISPUTED ** An issue was discovered in the GAEN (aka Google/Apple Exposure Notifications) protocol through 2020-10-05, as used in COVID-19 applications on Android and iOS. The encrypted metadata block with a TX value lacks a checksum, allowing bitflipping to amplify a contamination attack. This can cause metadata deanonymization and risk-score inflation. NOTE: the vendor's position is "We do not believe that TX power authentication would be a useful defense against relay attacks."

EPSS

Процентиль: 54%
0.00318
Низкий

5.9 Medium

CVSS3

Дефекты

CWE-294

Связанные уязвимости

CVSS3: 5.9
nvd
больше 5 лет назад

An issue was discovered in the GAEN (aka Google/Apple Exposure Notifications) protocol through 2020-10-05, as used in COVID-19 applications on Android and iOS. The encrypted metadata block with a TX value lacks a checksum, allowing bitflipping to amplify a contamination attack. This can cause metadata deanonymization and risk-score inflation. NOTE: the vendor's position is "We do not believe that TX power authentication would be a useful defense against relay attacks.

EPSS

Процентиль: 54%
0.00318
Низкий

5.9 Medium

CVSS3

Дефекты

CWE-294