A valid set of credentials in a .js file and a static token for
communication were obtained from the decompiled IPA. An attacker could
use the information to disrupt normal use of the application by changing
the translation files and thus weaken the integrity of normal use.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-52028 A valid set of credentials in a .js file and a static token for communication were obtained from the decompiled IPA. An attacker could use the information to disrupt normal use of the application by changing the translation files and thus weaken the integrity of normal use.
Fixes

Solution

Ossur recommends users download Version 1.5.5 or later of the mobile application. The latest version of the application can be obtained through the app store on respective mobile devices. No additional action is required by users.


Workaround

No workaround given by the vendor.

History

Tue, 21 Jan 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 17 Jan 2025 17:00:00 +0000

Type Values Removed Values Added
Description A valid set of credentials in a .js file and a static token for communication were obtained from the decompiled IPA. An attacker could use the information to disrupt normal use of the application by changing the translation files and thus weaken the integrity of normal use.
Title Ossur Mobile Logic Application Exposure of Sensitive System Information to an Unauthorized Control Sphere
Weaknesses CWE-497
References
Metrics cvssV3_1

{'score': 4.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N'}

cvssV4_0

{'score': 5.6, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-01-21T16:40:39.805Z

Reserved: 2024-12-17T14:11:48.969Z

Link: CVE-2024-53683

cve-icon Vulnrichment

Updated: 2025-01-21T16:40:36.011Z

cve-icon NVD

Status : Received

Published: 2025-01-17T17:15:12.053

Modified: 2025-01-17T17:15:12.053

Link: CVE-2024-53683

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses