First published: Mon Mar 04 2019(Updated: )
Envoy Passport for Android and Envoy Passport for iPhone could allow a local attacker to obtain sensitive information, caused by the storing of hardcoded OAuth Creds in plaintext. An attacker could exploit this vulnerability to obtain sensitive information.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
Envoy Passport | =2.2.5 | |
Envoy Passport | =2.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-17500 is classified as a medium severity vulnerability due to the potential exposure of sensitive information.
To fix CVE-2018-17500, update Envoy Passport to the latest version where this issue has been addressed.
CVE-2018-17500 affects Envoy Passport for Android and iPhone with specific versions 2.2.5 and 2.4.0.
CVE-2018-17500 may expose hardcoded OAuth credentials stored in plaintext.
CVE-2018-17500 requires local access to the device, thus it cannot be exploited remotely.