communication were obtained from the decompiled IPA. An attacker could
use the information to disrupt normal use of the application by changing
the translation files and thus weaken the integrity of normal use.
No analysis available yet.
Vendor Solution
Ossur recommends users download Version 1.5.5 or later of the mobile application. The latest version of the application can be obtained through the app store on respective mobile devices. No additional action is required by users.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-52028 | A valid set of credentials in a .js file and a static token for communication were obtained from the decompiled IPA. An attacker could use the information to disrupt normal use of the application by changing the translation files and thus weaken the integrity of normal use. |
Tue, 21 Jan 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 17 Jan 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A valid set of credentials in a .js file and a static token for communication were obtained from the decompiled IPA. An attacker could use the information to disrupt normal use of the application by changing the translation files and thus weaken the integrity of normal use. | |
| Title | Ossur Mobile Logic Application Exposure of Sensitive System Information to an Unauthorized Control Sphere | |
| Weaknesses | CWE-497 | |
| References |
| |
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-01-21T16:40:39.805Z
Reserved: 2024-12-17T14:11:48.969Z
Link: CVE-2024-53683
Updated: 2025-01-21T16:40:36.011Z
Status : Received
Published: 2025-01-17T17:15:12.053
Modified: 2025-01-17T17:15:12.053
Link: CVE-2024-53683
No data.
OpenCVE Enrichment
No data.
EUVD