cve/2022/CVE-2022-41209.md

18 lines
829 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-41209](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41209)
![](https://img.shields.io/static/v1?label=Product&message=SAP%20Customer%20Data%20Cloud%20(Gigya)&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%207.4%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-326&color=brighgreen)
### Description
SAP Customer Data Cloud (Gigya mobile app for Android) - version 7.4, uses encryption method which lacks proper diffusion and does not hide the patterns well. This can lead to information disclosure. In certain scenarios, application might also be susceptible to replay attacks.
### POC
#### Reference
- https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
#### Github
No PoCs found on GitHub currently.