Описание
AirDroid before 1.0.7 beta uses a cleartext base64 format for data transfer that is documented as an "Encrypted Transmission" feature, which allows remote attackers to obtain sensitive information by sniffing the local wireless network, as demonstrated by the SMS message content sent to the sdctl/sms/send/single/ URI.
Уязвимые конфигурации
Конфигурация 1Версия до 1.0.6 (включая)
Одно из
cpe:2.3:a:airdroid:airdroid:*:beta:*:*:*:*:*:*
cpe:2.3:a:airdroid:airdroid:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:airdroid:airdroid:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:airdroid:airdroid:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:airdroid:airdroid:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:airdroid:airdroid:1.0.4:beta:*:*:*:*:*:*
cpe:2.3:a:airdroid:airdroid:1.0.5:*:*:*:*:*:*:*
EPSS
Процентиль: 48%
0.0025
Низкий
5 Medium
CVSS2
Дефекты
CWE-310
Связанные уязвимости
github
больше 3 лет назад
AirDroid before 1.0.7 beta uses a cleartext base64 format for data transfer that is documented as an "Encrypted Transmission" feature, which allows remote attackers to obtain sensitive information by sniffing the local wireless network, as demonstrated by the SMS message content sent to the sdctl/sms/send/single/ URI.
EPSS
Процентиль: 48%
0.0025
Низкий
5 Medium
CVSS2
Дефекты
CWE-310