Description
ASUS WebStorage has a hardcoded API Token in the APP source code. An unauthenticated remote attacker can use this token to establish connections with the server and carry out login attempts to general user accounts. A successful login to a general user account allows the attacker to access, modify or delete this user account information.
No analysis available yet.
Remediation
Vendor Solution
Update ASUS WebStorage Android version to 3.10.2
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-31222 | ASUS WebStorage has a hardcoded API Token in the APP source code. An unauthenticated remote attacker can use this token to establish connections with the server and carry out login attempts to general user accounts. A successful login to a general user account allows the attacker to access, modify or delete this user account information. |
References
| Link | Providers |
|---|---|
| https://www.twcert.org.tw/tw/cp-132-6041-7bd67-1.html |
|
History
No history.
Status: PUBLISHED
Assigner: twcert
Published:
Updated: 2024-09-16T19:24:14.105Z
Reserved: 2022-03-08T00:00:00.000Z
Link: CVE-2022-26672
No data.
Status : Modified
Published: 2022-04-22T07:15:07.510
Modified: 2024-11-21T06:54:18.180
Link: CVE-2022-26672
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD