Vulnerability Details : CVE-2021-36460
VeryFitPro (com.veryfit2hr.second) 3.2.8 hashes the account's password locally on the device and uses the hash to authenticate in all communication with the backend API, including login, registration and changing of passwords. This allows an attacker in possession of a hash to takeover a user's account, rendering the benefits of storing hashed passwords in the database useless.
Products affected by CVE-2021-36460
- cpe:2.3:a:veryfitpro_project:veryfitpro:*:*:*:*:*:iphone_os:*:*
- cpe:2.3:a:veryfitpro_project:veryfitpro:*:*:*:*:*:android:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-36460
0.09%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 37 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-36460
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.6
|
MEDIUM | AV:L/AC:L/Au:N/C:P/I:P/A:P |
3.9
|
6.4
|
NIST | |
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2021-36460
-
The product stores sensitive information in cleartext within a resource that might be accessible to another control sphere.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-36460
-
http://www.i-doo.cn
IDO-首页Not Applicable
-
http://veryfitpro.com
Veryfitpro.com is for sale | HugeDomainsNot Applicable;Third Party Advisory
-
https://github.com/martinfrancois/CVE-2021-36460
GitHub - martinfrancois/CVE-2021-36460Exploit;Mitigation;Third Party Advisory
Jump to