KDDI +Message App, NTT DOCOMO +Message App, and SoftBank +Message App contain a vulnerability caused by improper handling of Unicode control characters. +Message App displays text unprocessed, even when control characters are contained, and the text is shown based on Unicode control character's specifications. Therefore, a crafted text may display misleading web links. As a result, a spoofed URL may be displayed and phishing attacks may be conducted. Affected products and versions are as follows: KDDI +Message App for Android prior to version 3.9.2 and +Message App for iOS prior to version 3.9.4, NTT DOCOMO +Message App for Android prior to version 54.49.0500 and +Message App for iOS prior to version 3.9.4, and SoftBank +Message App for Android prior to version 12.9.5 and +Message App for iOS prior to version 3.9.4
References
Link | Resource |
---|---|
https://jvn.jp/en/jp/JVN43561812/index.html | Third Party Advisory |
https://www.au.com/mobile/service/plus-message/information/ | Vendor Advisory |
https://www.docomo.ne.jp/service/plus_message/ | Vendor Advisory |
https://www.softbank.jp/mobile/service/plus-message/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2022-12-21 01:15
Updated : 2023-01-04 10:44
NVD link : CVE-2022-43543
Mitre link : CVE-2022-43543
JSON object : View
CWE
Products Affected
docomo
- \+_message
kddi
- \+_message
softbank
- \+_message