CVE-2020-25493

Oclean Mobile Application 2.1.2 communicates with an external website using HTTP so it is possible to eavesdrop the network traffic. The content of HTTP payload is encrypted using XOR with a hardcoded key, which allows for the possibility to decode the traffic.
Configurations

Configuration 1 (hide)

cpe:2.3:a:oclean:oclean:2.1.2:*:*:*:*:*:*:*

History

17 Feb 2021, 19:39

Type Values Removed Values Added
CWE CWE-327
CPE cpe:2.3:a:oclean:oclean:2.1.2:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 7.5
References (MISC) http://oclean.com - (MISC) http://oclean.com - Product
References (MISC) https://play.google.com/store/apps/details?id=com.yunding.noopsychebrushforeign - (MISC) https://play.google.com/store/apps/details?id=com.yunding.noopsychebrushforeign - Product
References (MISC) https://github.com/c3r34lk1ll3r/decrypt-oclean-traffic - (MISC) https://github.com/c3r34lk1ll3r/decrypt-oclean-traffic - Exploit, Third Party Advisory

11 Feb 2021, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-02-11 18:15

Updated : 2023-12-10 13:41


NVD link : CVE-2020-25493

Mitre link : CVE-2020-25493

CVE.ORG link : CVE-2020-25493


JSON object : View

Products Affected

oclean

  • oclean
CWE
CWE-327

Use of a Broken or Risky Cryptographic Algorithm

CWE-798

Use of Hard-coded Credentials