Show plain JSON{"id": "CVE-2024-6295", "cveTags": [], "metrics": {"cvssMetricV31": [{"type": "Primary", "source": "twcert@cert.org.tw", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 3.9, "attackVector": "PHYSICAL", "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "HIGH", "confidentialityImpact": "HIGH"}, "impactScore": 3.6, "exploitabilityScore": 0.3}]}, "published": "2024-06-25T03:15:10.740", "references": [{"url": "https://www.twcert.org.tw/en/cp-139-7895-80dac-2.html", "source": "twcert@cert.org.tw"}, {"url": "https://www.twcert.org.tw/tw/cp-132-7894-aebd8-1.html", "source": "twcert@cert.org.tw"}], "vulnStatus": "Awaiting Analysis", "weaknesses": [{"type": "Secondary", "source": "twcert@cert.org.tw", "description": [{"lang": "en", "value": "CWE-922"}]}], "descriptions": [{"lang": "en", "value": "udn News Android APP stores the unencrypted user session in the local database when user log into the application. A malicious APP or an attacker with physical access to the Android device can retrieve this session and use it to log into the news APP and other services provided by udn."}, {"lang": "es", "value": "La aplicaci\u00f3n para Android udn News almacena la sesi\u00f3n del usuario sin cifrar en la base de datos local cuando el usuario inicia sesi\u00f3n en la aplicaci\u00f3n. Una APP maliciosa o un atacante con acceso f\u00edsico al dispositivo Android puede recuperar esta sesi\u00f3n y utilizarla para iniciar sesi\u00f3n en la APP de noticias y otros servicios proporcionados por la udn."}], "lastModified": "2024-06-25T12:24:17.873", "sourceIdentifier": "twcert@cert.org.tw"}