Описание
An issue was discovered in the GAEN (aka Google/Apple Exposure Notifications) protocol through 2020-09-29, as used in COVID-19 applications on Android and iOS. It allows a user to be put in a position where he or she can be coerced into proving or disproving an exposure notification, because of the persistent state of a private framework.
Ссылки
- Third Party AdvisoryVDB Entry
- Vendor Advisory
- Third Party Advisory
- Mailing ListThird Party Advisory
- Third Party AdvisoryVDB Entry
- Vendor Advisory
- Third Party Advisory
- Mailing ListThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.5 (включая)Версия до 1.5 (включая)
Одно из
cpe:2.3:a:apple:exposure_notifications:*:*:*:*:*:iphone_os:*:*
cpe:2.3:a:google:exposure_notifications:*:*:*:*:*:android:*:*
EPSS
Процентиль: 22%
0.00074
Низкий
5.7 Medium
CVSS3
3.3 Low
CVSS2
Дефекты
NVD-CWE-noinfo
Связанные уязвимости
github
больше 3 лет назад
An issue was discovered in the GAEN (aka Google Apple Encounter Notification) protocol through 2020-08-27, as used in Corona applications on Android and iOS. It allows a user to be put in a position where he or she can be coerced into proving or dis-proving an encounter notification.
EPSS
Процентиль: 22%
0.00074
Низкий
5.7 Medium
CVSS3
3.3 Low
CVSS2
Дефекты
NVD-CWE-noinfo