First published: Tue Mar 19 2019(Updated: )
Envoy Passport for Android and Envoy Passport for iPhone could allow a local attacker to obtain sensitive information, caused by the storing of unencrypted data in logs. An attacker could exploit this vulnerability to obtain two API keys, a token and other sensitive information.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
Envoy Passport | =2.2.5 | |
Envoy Passport | =2.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-17499 is considered to have a high severity due to the potential exposure of sensitive information.
To fix CVE-2018-17499, ensure that logs do not store unencrypted sensitive information and update to the latest versions of Envoy Passport.
CVE-2018-17499 affects Envoy Passport for iPhone version 2.2.5 and Envoy Passport for Android version 2.4.0.
CVE-2018-17499 can expose sensitive information such as two API keys and a token.
CVE-2018-17499 can be exploited by local attackers who have access to the logs containing unencrypted data.