CVE-2023-28647

Nextcloud iOS is an ios application used to interface with the nextcloud home cloud ecosystem. In versions prior to 4.7.0 when an attacker has physical access to an unlocked device, they may enable the integration into the iOS Files app and bypass the Nextcloud pin/password protection and gain access to a users files. It is recommended that the Nextcloud iOS app is upgraded to 4.7.0. There are no known workarounds for this vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:nextcloud:nextcloud:*:*:*:*:*:iphone_os:*:*

History

07 Apr 2023, 14:29

Type Values Removed Values Added
First Time Nextcloud nextcloud
Nextcloud
References (MISC) https://github.com/nextcloud/ios/pull/2344 - (MISC) https://github.com/nextcloud/ios/pull/2344 - Patch
References (MISC) https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wjgg-2v4p-2gq6 - (MISC) https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wjgg-2v4p-2gq6 - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.8
CPE cpe:2.3:a:nextcloud:nextcloud:*:*:*:*:*:iphone_os:*:*
CWE CWE-287
CWE-281
NVD-CWE-noinfo

30 Mar 2023, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-03-30 19:15

Updated : 2023-12-10 15:01


NVD link : CVE-2023-28647

Mitre link : CVE-2023-28647

CVE.ORG link : CVE-2023-28647


JSON object : View

Products Affected

nextcloud

  • nextcloud
CWE
NVD-CWE-noinfo CWE-281

Improper Preservation of Permissions

CWE-287

Improper Authentication