Vulnerability Description
"Piccoma" App for Android and iOS versions prior to 6.20.0 uses a hard-coded API key for an external service, which may allow a local attacker to obtain the API key. Note that the users of the app are not directly affected by this vulnerability.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://apps.apple.com/jp/app/%E3%83%94%E3%83%83%E3%82%B3%E3%83%9E/id1091496983
- https://jvn.jp/en/jp/JVN01073312/
- https://play.google.com/store/apps/details?id=jp.kakao.piccoma
- https://apps.apple.com/jp/app/%E3%83%94%E3%83%83%E3%82%B3%E3%83%9E/id1091496983
- https://jvn.jp/en/jp/JVN01073312/
- https://play.google.com/store/apps/details?id=jp.kakao.piccoma
FAQ
What is CVE-2024-38480?
CVE-2024-38480 is a vulnerability with a CVSS score of 4.0 (MEDIUM). "Piccoma" App for Android and iOS versions prior to 6.20.0 uses a hard-coded API key for an external service, which may allow a local attacker to obtain the API key. Note that the users of the app are...
How severe is CVE-2024-38480?
CVE-2024-38480 has been rated MEDIUM with a CVSS base score of 4.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-38480?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.