MASmobile Classic iOS version 1.7.24 and earlier
which allows remote attackers to retrieve sensitive data including customer data, security system status, and event history.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-40432 | Authorization bypass can be achieved by session ID prediction in MASmobile Classic Android version 1.16.18 and earlier and MASmobile Classic iOS version 1.7.24 and earlier which allows remote attackers to retrieve sensitive data including customer data, security system status, and event history. |
Solution
1. Uninstall MASmobile Classic Services - These services are installed and configured manually in IIS within a virtual directory. To uninstall, unpublish the services in IIS and remove the service files. All versions (v1.7, 1.8, and 1.9) were discontinued. 2. Remove the MASmobile Classic app from Android and iOS devices. All versions (v1.x.x) were discontinued and no longer available in the app stores (Play and AppStore). 3. Contact MAS to arrange the installation of MASterMind EX Services (v6.46 or later). These services do not run under IIS and must be configured in coordination with the customer. 4. Install MASmobile app from Play or AppStore (v2.x.x). This is not an upgrade to MASmobile Classic; it is a different app.
Workaround
No workaround given by the vendor.
No history.
Status: PUBLISHED
Assigner: Carrier
Published:
Updated: 2024-08-28T16:23:17.832Z
Reserved: 2023-06-22T00:00:00
Link: CVE-2023-36483
Updated: 2024-08-02T16:45:57.162Z
Status : Awaiting Analysis
Published: 2024-03-16T05:15:18.577
Modified: 2024-11-21T08:09:48.380
Link: CVE-2023-36483
No data.
OpenCVE Enrichment
No data.
EUVD