Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2020-26230

Опубликовано: 13 нояб. 2020
Источник: nvd
CVSS3: 7.4
CVSS3: 5.3
CVSS2: 2.6
EPSS Низкий

Описание

Radar COVID is the official COVID-19 exposure notification app for Spain. In affected versions of Radar COVID, identification and de-anonymization of COVID-19 positive users that upload Radar COVID TEKs to the Radar COVID server is possible. This vulnerability enables the identification and de-anonymization of COVID-19 positive users when using Radar COVID. The vulnerability is caused by the fact that Radar COVID connections to the server (uploading of TEKs to the backend) are only made by COVID-19 positives. Therefore, any on-path observer with the ability to monitor traffic between the app and the server can identify which users had a positive test. Such an adversary can be the mobile network operator (MNO) if the connection is done through a mobile network, the Internet Service Provider (ISP) if the connection is done through the Internet (e.g., a home network), a VPN provider used by the user, the local network operator in the case of enterprise networks, or any eavesdropper with a

Ссылки

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:radarcovid:radar-covid-backend-dp3t-server:*:*:*:*:*:*:*:*
Версия до 1.1.2 (исключая)
cpe:2.3:a:radarcovid:radarcovid:*:*:uniform_distribution:*:*:android:*:*
Версия до 1.0.7 (исключая)
cpe:2.3:a:radarcovid:radarcovid:*:*:uniform_distribution:*:*:iphone_os:*:*
Версия до 1.0.8 (исключая)
cpe:2.3:a:radarcovid:radarcovid:*:*:exponential_distribution:*:*:android:*:*
Версия до 1.1.0 (исключая)
cpe:2.3:a:radarcovid:radarcovid:*:*:exponential_distribution:*:*:iphone_os:*:*
Версия до 1.1.0 (исключая)

EPSS

Процентиль: 73%
0.00746
Низкий

7.4 High

CVSS3

5.3 Medium

CVSS3

2.6 Low

CVSS2

Дефекты

CWE-200

EPSS

Процентиль: 73%
0.00746
Низкий

7.4 High

CVSS3

5.3 Medium

CVSS3

2.6 Low

CVSS2

Дефекты

CWE-200