First published: Mon May 22 2023(Updated: )
An issue was discovered in KaiOS 3.0 and 3.1. The binary /system/kaios/api-daemon exposes a local web server on *.localhost with subdomains for each installed applications, e.g., myapp.localhost. An attacker can make fetch requests to api-deamon to determine if a given app is installed and read the manifest.webmanifest contents, including the app version.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
KaiOS | =3.0 | |
KaiOS | =3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-33293 is considered a high-severity vulnerability due to its potential for information disclosure and exploitation by attackers.
To fix CVE-2023-33293, upgrade KaiOS to the latest version that addresses the vulnerability as per the vendor's guidance.
CVE-2023-33293 impacts KaiOS versions 3.0 and 3.1.
CVE-2023-33293 can be exploited by an attacker making unauthorized fetch requests to the local web server to determine installed applications.
CVE-2023-33293 is a local vulnerability since it requires access to the device on which KaiOS is running.