2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2018-0691" ,
"sourceIdentifier" : "vultures@jpcert.or.jp" ,
"published" : "2018-11-15T15:29:00.910" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T03:38:45.323" ,
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Multiple +Message Apps (Softbank +Message App for Android prior to version 10.1.7, Softbank +Message App for iOS prior to version 1.1.23, NTT DOCOMO +Message App for Android prior to version 42.40.2800, NTT DOCOMO +Message App for iOS prior to version 1.1.23, KDDI +Message App for Android prior to version 1.0.6, and KDDI +Message App for iOS prior to version 1.1.23) do not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate."
} ,
{
"lang" : "es" ,
"value" : "M\u00faltiples aplicaciones +Message (Softbank +Message App para Android en versiones anteriores a la 10.1.7, Softbank +Message App para iOS en versiones anteriores a la 1.1.23, NTT DOCOMO +Message App para Android en versiones anteriores a la 42.40.2800, NTT DOCOMO +Message App para iOS en versiones anteriores a la 1.1.23, KDDI +Message App para Android en versiones anteriores a la 1.0.6 y KDDI +Message App para iOS en versiones anteriores a la 1.1.23) no verifican los certificados X.509 de los servidores SSL, lo que permite que atacantes Man-in-the-Middle (MitM) suplanten servidores y obtengan informaci\u00f3n sensible mediante un certificado manipulado."
}
] ,
"metrics" : {
"cvssMetricV30" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.0" ,
"vectorString" : "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 5.9 ,
"baseSeverity" : "MEDIUM" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "HIGH" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "NONE" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "NONE"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 2.2 ,
"impactScore" : 3.6
}
] ,
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:M/Au:N/C:P/I:N/A:N" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 4.3 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "MEDIUM" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "NONE" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "NONE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 8.6 ,
"impactScore" : 2.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-295"
}
]
}
] ,
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:kddi:\\+_message:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.0.6" ,
"matchCriteriaId" : "0244A620-EBAA-4F65-AB0C-62E6E170A79E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ntttocomo:\\+_message:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "42.40.2800" ,
"matchCriteriaId" : "5C87A220-FE7E-4EE4-AF60-0B1E51F2C1C0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:softbank:\\+_message:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "10.1.7" ,
"matchCriteriaId" : "BAEA3B86-3C5A-43E6-BF2E-0749FBA82134"
}
]
2024-12-08 03:06:42 +00:00
} ,
2023-04-24 12:24:31 +02:00
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
2024-12-08 03:06:42 +00:00
"criteria" : "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
2023-04-24 12:24:31 +02:00
}
]
2024-12-08 03:06:42 +00:00
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
2023-04-24 12:24:31 +02:00
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:kddi:\\+_message:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.1.23" ,
"matchCriteriaId" : "C5E96988-EF65-4FD7-AE75-1DC1665662D3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ntt_tocomo:\\+_message:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.1.23" ,
"matchCriteriaId" : "0F66E7A2-80AF-4B41-9A50-2515285485E9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:softbank:\\+_message:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.1.23" ,
"matchCriteriaId" : "5B6F7401-252B-41F4-BAD8-3E744021F562"
}
]
2024-12-08 03:06:42 +00:00
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "340C4071-1447-477F-942A-8E09EA29F917"
}
]
2023-04-24 12:24:31 +02:00
}
]
}
] ,
"references" : [
{
"url" : "http://jvn.jp/en/jp/JVN37288228/index.html" ,
"source" : "vultures@jpcert.or.jp" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://www.au.com/information/notice_mobile/service/2018-002/" ,
"source" : "vultures@jpcert.or.jp" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "https://www.nttdocomo.co.jp/info/notice/page/180927_00.html" ,
"source" : "vultures@jpcert.or.jp" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "https://www.softbank.jp/mobile/info/personal/news/service/20180927a/" ,
"source" : "vultures@jpcert.or.jp" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "http://jvn.jp/en/jp/JVN37288228/index.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://www.au.com/information/notice_mobile/service/2018-002/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "https://www.nttdocomo.co.jp/info/notice/page/180927_00.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "https://www.softbank.jp/mobile/info/personal/news/service/20180927a/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}