Description
Juiker app hard-coded its AES key in the source code. A physical attacker, after getting the Android root privilege, can use the AES key to decrypt users’ ciphertext and tamper with it.
No analysis available yet.
Remediation
Vendor Solution
Update Juiker app version to 4.6.0915.1
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-40719 | Juiker app hard-coded its AES key in the source code. A physical attacker, after getting the Android root privilege, can use the AES key to decrypt users’ ciphertext and tamper with it. |
References
| Link | Providers |
|---|---|
| https://www.twcert.org.tw/tw/cp-132-6630-d4d2f-1.html |
|
History
Wed, 07 May 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: twcert
Published:
Updated: 2025-05-07T13:34:07.470Z
Reserved: 2022-08-10T00:00:00.000Z
Link: CVE-2022-38117
Updated: 2024-08-03T10:45:52.820Z
Status : Modified
Published: 2022-10-24T14:15:50.863
Modified: 2024-11-21T07:15:49.673
Link: CVE-2022-38117
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD