Npci

Bharat Interface For Money (bhim)

4 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.28%
  • Veröffentlicht 24.08.2018 21:29:00
  • Zuletzt bearbeitet 21.11.2024 03:36:55

The National Payments Corporation of India BHIM application 1.3 for Android relies on a four-digit passcode, which makes it easier for attackers to obtain access.

  • EPSS 0.55%
  • Veröffentlicht 24.08.2018 21:29:00
  • Zuletzt bearbeitet 21.11.2024 03:36:55

The National Payments Corporation of India BHIM application 1.3 for Android does not properly restrict use of the OTP feature, which makes it easier for attackers to bypass authentication.

  • EPSS 0.58%
  • Veröffentlicht 24.08.2018 21:29:00
  • Zuletzt bearbeitet 21.11.2024 03:36:55

The National Payments Corporation of India BHIM application 1.3 for Android uses a custom keypad for which the input element is available to the Accessibility service, which makes it easier for attackers to bypass authentication.

  • EPSS 0.58%
  • Veröffentlicht 24.08.2018 21:29:00
  • Zuletzt bearbeitet 21.11.2024 03:36:55

The National Payments Corporation of India BHIM application 1.3 for Android relies on three hardcoded strings (AK-NPCIMB, IM-NPCIBM, and VK-NPCIBM) for SMS validation, which makes it easier for attackers to bypass authentication.