communication were obtained from the decompiled IPA. An attacker could
use the information to disrupt normal use of the application by changing
the translation files and thus weaken the integrity of normal use.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-52028 | A valid set of credentials in a .js file and a static token for communication were obtained from the decompiled IPA. An attacker could use the information to disrupt normal use of the application by changing the translation files and thus weaken the integrity of normal use. |
Solution
Ossur recommends users download Version 1.5.5 or later of the mobile application. The latest version of the application can be obtained through the app store on respective mobile devices. No additional action is required by users.
Workaround
No workaround given by the vendor.
Tue, 21 Jan 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 17 Jan 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A valid set of credentials in a .js file and a static token for communication were obtained from the decompiled IPA. An attacker could use the information to disrupt normal use of the application by changing the translation files and thus weaken the integrity of normal use. | |
| Title | Ossur Mobile Logic Application Exposure of Sensitive System Information to an Unauthorized Control Sphere | |
| Weaknesses | CWE-497 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-01-21T16:40:39.805Z
Reserved: 2024-12-17T14:11:48.969Z
Link: CVE-2024-53683
Updated: 2025-01-21T16:40:36.011Z
Status : Received
Published: 2025-01-17T17:15:12.053
Modified: 2025-01-17T17:15:12.053
Link: CVE-2024-53683
No data.
OpenCVE Enrichment
No data.
EUVD