Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:mycrops:higrade:1.0.337:*:*:*:*:*:*:*", "matchCriteriaId": "80F3D3AB-302E-468B-A629-7D1FEC180109", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "matchCriteriaId": "FC72A6B1-2BD5-4548-B495-3890C6197500", "versionEndIncluding": "5.1.1", "versionStartIncluding": "5.0", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "descriptions": [{"lang": "en", "value": "An issue was discovered in the MyCrops HiGrade \"THC Testing & Cannabi\" application 1.0.337 for Android. A remote attacker can start the camera feed via the com.cordovaplugincamerapreview.CameraActivity component in some situations. NOTE: this is only exploitable on Android versions that lack runtime permission checks, and of those only Android SDK 5.1.1 API 22 is consistent with the manifest. Thus, this applies only to Android Lollipop, affecting less than five percent of Android devices as of 2023."}, {"lang": "es", "value": "Se descubri\u00f3 un problema en la aplicaci\u00f3n MyCrops HiGrade \"THC Testing & Cannabi\" 1.0.337 para Android. Un atacante remoto puede iniciar la transmisi\u00f3n de la c\u00e1mara a trav\u00e9s del componente com.cordovaplugincamerapreview.CameraActivity en algunas situaciones. NOTA: esto solo se puede explotar en versiones de Android que carecen de comprobaciones de permisos de tiempo de ejecuci\u00f3n y, de ellas, solo Android SDK 5.1.1 API 22 es coherente con el manifiesto. Por lo tanto, esto se aplica s\u00f3lo a Android Lollipop, y afectar\u00e1 a menos del cinco por ciento de los dispositivos Android a partir de 2023."}], "id": "CVE-2023-40040", "lastModified": "2024-11-21T08:18:34.767", "metrics": {"cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1"}, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2023-09-11T06:15:43.830", "references": [{"source": "cve@mitre.org", "tags": ["Third Party Advisory"], "url": "https://github.com/actuator/cve/blob/main/CVE-2023-40040"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://github.com/actuator/cve/blob/main/CVE-2023-40040"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-862"}], "source": "nvd@nist.gov", "type": "Primary"}]}