Get a Pentest and security assessment of your IT network.

2021-current

CVE-2020-24721 – An issue was discovered in the GAEN (aka Google/Apple Exposure Notificati

An issue was discovered in the GAEN (aka Google/Apple Exposure Notifications) protocol through 2020-09-29, as used in COVID-19 applications on Android and iOS. It allows a user to be put in a position where he or she can be coerced into proving or disproving an exposure notification, because of the persistent state of a private framework.

 

Source: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24721

Reference (s):

  • FULLDISC:FULLDISC: 20200929 CVE-2020-24721: Corona Exposure Notifications API: risk of coercion/data leakage [vs]
  • URL: https://seclists.org/fulldisclosure/2020/Sep/53
  • http://packetstormsecurity.com/files/159419/Corona-Exposure-Notifications-API-Data-Leakage.html
  • https://blog.google/inside-google/company-announcements/update-exposure-notifications
  • https://github.com/minvws/nl-covid19-notification-app-coordination/blob/master/CVEs/CVE-2020-24721.txt
Related posts
2021-current

CVE-2004-1715 - Directory traversal vulnerability in MIMEsweeper for Web before 5.0.4 all

2021-current

CVE-2014-8508 - Cross-site scripting (XSS) vulnerability in s_network.asp in the Denon AV

2021-current

CVE-2020-0297 - In devicepolicy service, there is a possible permission bypass due to an

2021-current

CVE-2020-14315 - A memory corruption vulnerability is present in bspatch as shipped in Col