CVE-2019-5626 Vulnerability Details

  /     /     /  

CVE-2019-5626 Metadata Quick Info

CVE Published: 22/05/2019 | CVE Updated: 04/08/2024 | CVE Year: 2019
Source: rapid7 | Vendor: BlueCats | Product: Reveal
Status : PUBLISHED

CVE-2019-5626 Description

The Android mobile application BlueCats Reveal before 3.0.19 stores the username and password in a clear text file. This file persists until the user logs out or the session times out from non-usage (30 days of no user activity). This can allow an attacker to compromise the affected BlueCats network implementation. The attacker would first need to gain physical control of the Android device or compromise it with a malicious app.

Metrics

CVSS Version: 3.1 | Base Score: n/a
Vector: n/a

l➤ Exploitability Metrics:
    Attack Vector (AV)*
    Attack Complexity (AC)*
    Privileges Required (PR)*
    User Interaction (UI)*
    Scope (S)*

l➤ Impact Metrics:
    Confidentiality Impact (C)*
    Integrity Impact (I)*
    Availability Impact (A)*

Weakness Enumeration (CWE)

CWE-ID: CWE-922
CWE Name: CWE-922: Insecure Storage of Sensitive Information
Source: BlueCats

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID:
CAPEC Description:


Source: NVD (National Vulnerability Database).