Authorization bypass can be achieved by session ID prediction in MASmobile Classic Android  version 1.16.18 and earlier and

MASmobile Classic iOS version 1.7.24 and earlier

which allows remote attackers to retrieve sensitive data  including customer data, security system status, and event history.
Fixes

Solution

1. Uninstall MASmobile Classic Services - These services are installed and configured manually in IIS within a virtual directory. To uninstall, unpublish the services in IIS and remove the service files. All versions (v1.7, 1.8, and 1.9) were discontinued. 2. Remove the MASmobile Classic app from Android and iOS devices. All versions (v1.x.x) were discontinued and no longer available in the app stores (Play and AppStore). 3. Contact MAS to arrange the installation of MASterMind EX Services (v6.46 or later). These services do not run under IIS and must be configured in coordination with the customer. 4. Install MASmobile app from Play or AppStore (v2.x.x). This is not an upgrade to MASmobile Classic; it is a different app.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: Carrier

Published:

Updated: 2024-08-28T16:23:17.832Z

Reserved: 2023-06-22T00:00:00

Link: CVE-2023-36483

cve-icon Vulnrichment

Updated: 2024-08-02T16:45:57.162Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-03-16T05:15:18.577

Modified: 2024-11-21T08:09:48.380

Link: CVE-2023-36483

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.