2024-04-04 08:46:00 +00:00

113 lines
3.7 KiB
JSON

{
"id": "CVE-2020-35207",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-12-12T19:15:11.653",
"lastModified": "2024-03-21T02:36:40.123",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in the LogMein LastPass Password Manager (aka com.lastpass.ilastpass) app 4.8.11.2403 for iOS. The PIN authentication for unlocking can be bypassed by forcing the authentication result to be true through runtime manipulation. In other words, an attacker could authenticate with an arbitrary PIN. NOTE: the vendor has indicated that this is not an attack of interest within the context of their threat model, which excludes jailbroken devices"
},
{
"lang": "es",
"value": "** EN DISPUTA ** Se detect\u00f3 un problema en la aplicaci\u00f3n LogMein LastPass Password Manager (tambi\u00e9n se conoce como com.lastpass.ilastpass) 4.8.11.2403 para iOS. La autenticaci\u00f3n de PIN para el desbloqueo se puede omitir al forzar que el resultado de la autenticaci\u00f3n sea verdadero mediante la manipulaci\u00f3n del tiempo de ejecuci\u00f3n. En otras palabras, un atacante podr\u00eda autenticarse con un PIN arbitrario. NOTA: el proveedor ha indicado que este no es un ataque de inter\u00e9s dentro del contexto de su modelo de amenaza, que excluye los dispositivos con jailbreak"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "PHYSICAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 5.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.5,
"impactScore": 5.2
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:N",
"accessVector": "LOCAL",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 3.3
},
"baseSeverity": "LOW",
"exploitabilityScore": 3.4,
"impactScore": 4.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:logmein:lastpass:4.8.11.2403:*:*:*:*:iphone_os:*:*",
"matchCriteriaId": "B0EB5423-CBD2-4536-9DA3-A31A00791AA4"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/evilblazer/LastPassVulnerabilities",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://youtu.be/C5j7drIylsQ",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}