Vulnerability Description
In Garmin Connect 4.61, terminating a LiveTrack session wouldn't prevent the LiveTrack API from continued exposure of private personal information. NOTE: this is disputed by the vendor because the LiveTrack API service is not a customer-controlled product.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Garmin | Connect | 4.61 |
Related Weaknesses (CWE)
References
- https://www.samwallace.dev/research/Harvesting%20Emails%20with%20Expired%20GarmiExploitThird Party Advisory
- https://www.samwallace.dev/research/Harvesting%20Emails%20with%20Expired%20GarmiExploitThird Party Advisory
FAQ
What is CVE-2022-46081?
CVE-2022-46081 is a vulnerability with a CVSS score of 7.5 (HIGH). In Garmin Connect 4.61, terminating a LiveTrack session wouldn't prevent the LiveTrack API from continued exposure of private personal information. NOTE: this is disputed by the vendor because the Liv...
How severe is CVE-2022-46081?
CVE-2022-46081 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-46081?
Check the references section above for vendor advisories and patch information. Affected products include: Garmin Connect.