Vulnerability Description
Session 1.13.0 allows an attacker with physical access to the victim's device to bypass the application's password/pin lock to access user data. This is possible due to lack of adequate security controls to prevent dynamic code manipulation.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Opft | Session | 1.13.0 |
Related Weaknesses (CWE)
References
- https://fluidattacks.com/advisories/tempest/ExploitIssue TrackingThird Party Advisory
- https://github.com/oxen-io/session-androidProductThird Party Advisory
- https://github.com/oxen-io/session-android/pull/897ExploitIssue TrackingThird Party Advisory
- https://fluidattacks.com/advisories/tempest/ExploitIssue TrackingThird Party Advisory
- https://github.com/oxen-io/session-androidProductThird Party Advisory
- https://github.com/oxen-io/session-android/pull/897ExploitIssue TrackingThird Party Advisory
FAQ
What is CVE-2022-1955?
CVE-2022-1955 is a vulnerability with a CVSS score of 4.6 (MEDIUM). Session 1.13.0 allows an attacker with physical access to the victim's device to bypass the application's password/pin lock to access user data. This is possible due to lack of adequate security contr...
How severe is CVE-2022-1955?
CVE-2022-1955 has been rated MEDIUM with a CVSS base score of 4.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-1955?
Check the references section above for vendor advisories and patch information. Affected products include: Opft Session.