Vulnerability Details : CVE-2015-9232
The Good for Enterprise application 3.0.0.415 for Android does not use signature protection for its Authentication Delegation API intent. Also, the Good Dynamic application activation process does not attempt to detect malicious activation attempts involving modified names beginning with a com.good.gdgma substring. Consequently, an attacker could obtain access to intranet data. This issue is only relevant in cases where the user has already downloaded a malicious Android application.
Products affected by CVE-2015-9232
- cpe:2.3:a:good:good_for_enterprise:3.0.0.415:*:*:*:*:android:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-9232
0.23%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 61 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-9232
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
2.6
|
LOW | AV:N/AC:H/Au:N/C:P/I:N/A:N |
4.9
|
2.9
|
NIST | |
5.3
|
MEDIUM | CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N |
1.6
|
3.6
|
NIST |
CWE ids for CVE-2015-9232
-
The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-9232
-
http://www.securityfocus.com/archive/1/536543
SecurityFocusExploit;Mitigation;Third Party Advisory;VDB Entry
-
https://www.modzero.ch/advisories/MZ-15-03-GOOD-Auth-Delegation.txt
Exploit;Mitigation;Third Party Advisory
-
https://community.blackberry.com/community/blogs/blog/2015/10/02/what-you-need-to-know-modzero-insecure-application-coupling
Customer Portals - GlobalThird Party Advisory
Jump to