CVE-2019-5627 Vulnerability Details

  /     /     /  

CVE-2019-5627 Metadata Quick Info

CVE Published: 22/05/2019 | CVE Updated: 04/08/2024 | CVE Year: 2019
Source: rapid7 | Vendor: BlueCats | Product: Reveal
Status : PUBLISHED

CVE-2019-5627 Description

The iOS mobile application BlueCats Reveal before 5.14 stores the username and password in the app cache as base64 encoded strings, i.e. clear text. These persist in the cache even if the user logs out. This can allow an attacker to compromise the affected BlueCats network implementation. The attacker would first need to gain physical control of the iOS device or compromise it with a malicious app.

Metrics

CVSS Version: 3.1 | Base Score: n/a
Vector: n/a

l➤ Exploitability Metrics:
    Attack Vector (AV)*
    Attack Complexity (AC)*
    Privileges Required (PR)*
    User Interaction (UI)*
    Scope (S)*

l➤ Impact Metrics:
    Confidentiality Impact (C)*
    Integrity Impact (I)*
    Availability Impact (A)*

Weakness Enumeration (CWE)

CWE-ID: CWE-922
CWE Name: CWE-922: Insecure Storage of Sensitive Information
Source: BlueCats

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID:
CAPEC Description:


Source: NVD (National Vulnerability Database).