CVE-2023-28646

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2023-28646
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-28646.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-28646
Aliases
  • GHSA-c3rf-94h6-vj8v
Published
2023-03-30T19:15:06Z
Modified
2024-05-29T20:52:01Z
Severity
  • 2.4 (Low) CVSS_V3 - CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
[none]
Details

Nextcloud android is an android app for interfacing with the nextcloud home server ecosystem. In versions from 3.7.0 and before 3.24.1 an attacker that has access to the unlocked physical device can bypass the Nextcloud Android Pin/passcode protection via a thirdparty app. This allows to see meta information like sharer, sharees and activity of files. It is recommended that the Nextcloud Android app is upgraded to 3.24.1. There are no known workarounds for this vulnerability.

References

Affected packages

Git / github.com/nextcloud/android

Affected ranges

Type
GIT
Repo
https://github.com/nextcloud/android
Events