Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2023-28646 | First vendor Publication | 2023-03-30 |
Vendor | Cve | Last vendor Modification | 2023-04-07 |
Security-Database Scoring CVSS v3
Cvss vector : CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N | |||
---|---|---|---|
Overall CVSS Score | 2.4 | ||
Base Score | 2.4 | Environmental Score | 2.4 |
impact SubScore | 1.4 | Temporal Score | 2.4 |
Exploitabality Sub Score | 0.9 | ||
Attack Vector | Physical | Attack Complexity | Low |
Privileges Required | None | User Interaction | None |
Scope | Unchanged | Confidentiality Impact | Low |
Integrity Impact | None | Availability Impact | None |
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : | |||
---|---|---|---|
Cvss Base Score | N/A | Attack Range | N/A |
Cvss Impact Score | N/A | Attack Complexity | N/A |
Cvss Expoit Score | N/A | Authentication | N/A |
Calculate full CVSS 2.0 Vectors scores |
Detail
Nextcloud android is an android app for interfacing with the nextcloud home server ecosystem. In versions from 3.7.0 and before 3.24.1 an attacker that has access to the unlocked physical device can bypass the Nextcloud Android Pin/passcode protection via a thirdparty app. This allows to see meta information like sharer, sharees and activity of files. It is recommended that the Nextcloud Android app is upgraded to 3.24.1. There are no known workarounds for this vulnerability. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28646 |
CPE : Common Platform Enumeration
Sources (Detail)
Source | Url |
---|---|
MISC | https://github.com/nextcloud/android/pull/11242 https://github.com/nextcloud/security-advisories/security/advisories/GHSA-c3r... |
Alert History
Date | Informations |
---|---|
2023-04-11 00:27:28 |
|
2023-04-07 09:27:25 |
|
2023-03-31 17:27:17 |
|
2023-03-31 00:27:15 |
|