Oclean Mobile Application 2.1.2 communicates with an external website using HTTP so it is possible to eavesdrop the network traffic. The content of HTTP payload is encrypted using XOR with a hardcoded key, which allows for the possibility to decode the traffic.
References
Link | Resource |
---|---|
http://oclean.com | Product |
https://github.com/c3r34lk1ll3r/decrypt-oclean-traffic | Exploit Third Party Advisory |
https://play.google.com/store/apps/details?id=com.yunding.noopsychebrushforeign | Product |
Configurations
History
17 Feb 2021, 19:39
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-327 | |
CPE | cpe:2.3:a:oclean:oclean:2.1.2:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 7.5 |
References | (MISC) http://oclean.com - Product | |
References | (MISC) https://play.google.com/store/apps/details?id=com.yunding.noopsychebrushforeign - Product | |
References | (MISC) https://github.com/c3r34lk1ll3r/decrypt-oclean-traffic - Exploit, Third Party Advisory |
11 Feb 2021, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-02-11 18:15
Updated : 2023-12-10 13:41
NVD link : CVE-2020-25493
Mitre link : CVE-2020-25493
CVE.ORG link : CVE-2020-25493
JSON object : View
Products Affected
oclean
- oclean