Описание
TronLink Wallet 2.2.0 stores user wallet keystore in plaintext and places them in insecure storage. An attacker can read and reuse the user keystore of a valid user via /data/data/com.tronlink.wallet/shared_prefs/.xml to gain unauthorized access.
Ссылки
- ExploitThird Party Advisory
- ExploitThird Party Advisory
- ExploitThird Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:tronlink:wallet:2.2.0:*:*:*:*:android:*:*
EPSS
Процентиль: 42%
0.00197
Низкий
9.8 Critical
CVSS3
5 Medium
CVSS2
Дефекты
CWE-312
Связанные уязвимости
CVSS3: 9.8
github
больше 3 лет назад
TronLink Wallet 2.2.0 stores user wallet keystore in plaintext and places them in insecure storage. An attacker can read and reuse the user keystore of a valid user via /data/data/com.tronlink.wallet/shared_prefs/<wallet-name>.xml to gain unauthorized access.
EPSS
Процентиль: 42%
0.00197
Низкий
9.8 Critical
CVSS3
5 Medium
CVSS2
Дефекты
CWE-312