5.9
CVE-2020-24722
- EPSS 0.32%
- Veröffentlicht 07.10.2020 15:15:12
- Zuletzt bearbeitet 21.11.2024 05:15:58
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
An issue was discovered in the GAEN (aka Google/Apple Exposure Notifications) protocol through 2020-10-05, as used in COVID-19 applications on Android and iOS. The encrypted metadata block with a TX value lacks a checksum, allowing bitflipping to amplify a contamination attack. This can cause metadata deanonymization and risk-score inflation. NOTE: the vendor's position is "We do not believe that TX power authentication would be a useful defense against relay attacks.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Exposure Notifications Project ≫ Exposure Notifications SwPlatformandroid Version <= 2020-10-05
Exposure Notifications Project ≫ Exposure Notifications SwPlatformiphone_os Version <= 2020-10-05
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.32% | 0.543 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 5.9 | 2.2 | 3.6 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
|
| nvd@nist.gov | 2.6 | 4.9 | 2.9 |
AV:N/AC:H/Au:N/C:N/I:P/A:N
|
CWE-294 Authentication Bypass by Capture-replay
A capture-replay flaw exists when the design of the product makes it possible for a malicious user to sniff network traffic and bypass authentication by replaying it to the server in question to the same effect as the original message (or with minor changes).