MartiniCreations PassmanLite Password Manager up to 1.42 cryptographic issue
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 3.8 | $0-$5k | 0.00 |
Summary
A vulnerability described as problematic has been identified in MartiniCreations PassmanLite Password Manager up to 1.42. The affected element is an unknown function of the component Password Manager. The manipulation results in cryptographic issue. This vulnerability is identified as CVE-2011-1840. There is not any exploit available. Upgrading the affected component is recommended.
Details
A vulnerability was found in MartiniCreations PassmanLite Password Manager up to 1.42. It has been classified as problematic. Affected is an unknown code block of the component Password Manager. The manipulation with an unknown input leads to a cryptographic issue vulnerability. CWE is classifying the issue as CWE-310. This is going to have an impact on confidentiality. CVE summarizes:
The MartiniCreations PassmanLite Password Manager application before 1.48 for Android stores the master password and unspecified other account information in cleartext, which allows local users to obtain sensitive information by leveraging shell access.
The weakness was released 05/13/2011 (Website). The advisory is available at simonroses.com. This vulnerability is traded as CVE-2011-1840 since 04/28/2011. The exploitability is told to be easy. Local access is required to approach this attack. The exploitation doesn't require any form of authentication. The technical details are unknown and an exploit is not available. This vulnerability is assigned to T1600 by the MITRE ATT&CK project.
Upgrading to version 1.43 eliminates this vulnerability.
The vulnerability is also documented in the vulnerability database at SecurityFocus (BID 47765†). If you want to get best quality of vulnerability data, you may have to visit VulDB.
Product
Vendor
Name
Version
- 1.0
- 1.1
- 1.2
- 1.3
- 1.4
- 1.5
- 1.6
- 1.7
- 1.8
- 1.9
- 1.10
- 1.11
- 1.12
- 1.13
- 1.14
- 1.15
- 1.16
- 1.17
- 1.18
- 1.19
- 1.20
- 1.21
- 1.22
- 1.23
- 1.24
- 1.25
- 1.26
- 1.27
- 1.28
- 1.29
- 1.30
- 1.31
- 1.32
- 1.33
- 1.34
- 1.35
- 1.36
- 1.37
- 1.38
- 1.39
- 1.40
- 1.41
- 1.42
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 4.0VulDB Meta Temp Score: 3.8
VulDB Base Score: 4.0
VulDB Temp Score: 3.8
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Cryptographic issueCWE: CWE-310
CAPEC: 🔍
ATT&CK: 🔍
Physical: Partially
Local: Yes
Remote: No
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: PassmanLite Password Manager 1.43
Timeline
04/28/2011 🔍05/06/2011 🔍
05/13/2011 🔍
05/13/2011 🔍
03/23/2015 🔍
01/16/2018 🔍
Sources
Advisory: simonroses.comStatus: Not defined
CVE: CVE-2011-1840 (🔍)
GCVE (CVE): GCVE-0-2011-1840
GCVE (VulDB): GCVE-100-57426
SecurityFocus: 47765 - PassmanLite Password Manager for Android Information Disclosure Vulnerability
Entry
Created: 03/23/2015 16:50Updated: 01/16/2018 08:18
Changes: 03/23/2015 16:50 (51), 01/16/2018 08:18 (1)
Complete: 🔍
Cache ID: 216:DCB:103
If you want to get best quality of vulnerability data, you may have to visit VulDB.
No comments yet. Languages: en.
Please log in to comment.