CVE-2016-6545

Published on: 07/13/2018 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:12 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Certain versions of Itrackeasy from Ieasytec contain the following vulnerability:

Session cookies are not used for maintaining valid sessions in iTrack Easy. The user's password is passed as a POST parameter over HTTPS using a base64 encoded passwd field on every request. In this implementation, sessions can only be terminated when the user changes the associated password.

  • CVE-2016-6545 has been assigned by URL Logo [email protected] to track the vulnerability - currently rated as - currently rated as CRITICAL severity.
  • Affected Vendor/Software: URL Logo iTrack - Easy version N/A

CVSS3 Score: 9.8 - CRITICAL

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 5 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL NONE NONE

CVE References

Description Tags Link
Vulnerability Note VU#974055 - iTrack Easy contains multiple vulnerabilities Third Party Advisory
US Government Resource
www.kb.cert.org
text/html
URL Logo CERT-VN VU#974055
Multiple Bluetooth Low Energy (BLE) Tracker Vulnerabilities Third Party Advisory
blog.rapid7.com
text/html
URL Logo MISC blog.rapid7.com/2016/10/25/multiple-bluetooth-low-energy-ble-tracker-vulnerabilities/
iTrack Easy VU#974055 Multiple Security Vulnerabilities Third Party Advisory
VDB Entry
cve.report (archive)
text/html
URL Logo BID 93875

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationIeasytecItrackeasy-AllAllAll
ApplicationIeasytecItrackeasy-AllAllAll
  • cpe:2.3:a:ieasytec:itrackeasy:-:*:*:*:*:*:*:*:
  • cpe:2.3:a:ieasytec:itrackeasy:-:*:*:*:*:*:*:*:

Discovery Credit

Thanks to Deral Heiland and Adam Compton of Rapid7, Inc. for reporting this vulnerability.