CVE-2023-28646

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-28646
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-28646.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-28646
Aliases
  • GHSA-c3rf-94h6-vj8v
Published
2023-03-30T18:16:18Z
Modified
2025-10-15T02:27:45.686261Z
Severity
  • 4.4 (Medium) CVSS_V3 - CVSS:3.1/AV:P/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L CVSS Calculator
Summary
App lockout in nextcloud Android app can be bypassed via thirdparty apps
Details

Nextcloud android is an android app for interfacing with the nextcloud home server ecosystem. In versions from 3.7.0 and before 3.24.1 an attacker that has access to the unlocked physical device can bypass the Nextcloud Android Pin/passcode protection via a thirdparty app. This allows to see meta information like sharer, sharees and activity of files. It is recommended that the Nextcloud Android app is upgraded to 3.24.1. There are no known workarounds for this vulnerability.

References

Affected packages

Git / github.com/nextcloud/android

Affected ranges

Type
GIT
Repo
https://github.com/nextcloud/android
Events