Impact
The vulnerability lies in the Google Cloud Service Account Key Handler component of Albert Health, where the file resources/assets/service-account.json is stored without protection. The exposed credentials can be used by an attacker to gain unauthorized access to Google Cloud resources, potentially compromising data confidentiality and integrity. The weakness is a cleartext storage of sensitive information (CWE–255) and a plain text disclosure of credentials (CWE–256). The description states that the vulnerability requires a local approach and that the exploitation is considered difficult, yet the exploit has been made public.
Affected Systems
The affected product is Albert Sağlık Hizmetleri ve Ticaret:Albert Health version 1.7.3 and earlier on Android devices. The vulnerability involves an unknown function within the service-account.json file mentioned as part of the Google Cloud Service Account Key Handler.
Risk and Exploitability
The CVSS score is 2, indicating low severity, and the EPSS score is not available. The vulnerability is not listed inV catalog. The attack vector is inferred to be local, with high complexity and difficult exploitability as stated in the vendor description. Despite the low CVSS, the availability of public exploits suggests that a local actor could potentially retrieve service account keys and use them to access sensitive cloud data.
OpenCVE Enrichment