The TrackR Bravo mobile app stores the account password used to authenticate to the cloud API in cleartext in the cache.db file. Updated apps, version 5.1.6 for iOS and 2.2.5 for Android, have been released by the vendor to address the vulnerabilities in CVE-2016-6538, CVE-2016-6539, CVE-2016-6540 and CVE-2016-6541.
References
Link | Resource |
---|---|
https://www.kb.cert.org/vuls/id/TNOY-AF3KCZ | Third Party Advisory US Government Resource |
https://www.kb.cert.org/vuls/id/617567 | Third Party Advisory US Government Resource |
https://blog.rapid7.com/2016/10/25/multiple-bluetooth-low-energy-ble-tracker-vulnerabilities/ | Exploit Third Party Advisory |
http://www.securityfocus.com/bid/93874 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2018-07-06 14:29
Updated : 2019-10-09 16:19
NVD link : CVE-2016-6538
Mitre link : CVE-2016-6538
JSON object : View
CWE
Products Affected
thetrackr
- trackr_bravo_firmware
- trackr_bravo