CVE-2016-6548
Published on: 07/13/2018 12:00:00 AM UTC
Last Modified on: 03/23/2021 11:27:11 PM UTC
Certain versions of Nut Mobile from Nutspace contain the following vulnerability:
The Zizai Tech Nut mobile app makes requests via HTTP instead of HTTPS. These requests contain the user's authenticated session token with the URL. An attacker can capture these requests and reuse the session token to gain full access the user's account.
- CVE-2016-6548 has been assigned by
[email protected] to track the vulnerability - currently rated as - currently rated as CRITICAL severity.
- Affected Vendor/Software:
Zizai Technology - Tech Nut Mobile Application version N/A
CVSS3 Score: 9.8 - CRITICAL
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
|
---|---|---|---|---|
NETWORK | LOW | NONE | NONE | |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
|
UNCHANGED | HIGH | HIGH | HIGH |
CVSS2 Score: 5 - MEDIUM
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
NETWORK | LOW | NONE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
PARTIAL | NONE | NONE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
Zizai Tech Nut Multiple Security Vulnerabilities | Third Party Advisory VDB Entry cve.report (archive) text/html |
![]() |
Multiple Bluetooth Low Energy (BLE) Tracker Vulnerabilities | Exploit Third Party Advisory blog.rapid7.com text/html |
![]() |
Vulnerability Note VU#402847 - Zizai Tech Nut contains multiple vulnerabilities | Third Party Advisory US Government Resource www.kb.cert.org text/html |
![]() |
There are currently no QIDs associated with this CVE
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Application | Nutspace | Nut Mobile | - | All | All | All |
Application | Nutspace | Nut Mobile | - | All | All | All |
- cpe:2.3:a:nutspace:nut_mobile:-:*:*:*:*:*:*:*:
- cpe:2.3:a:nutspace:nut_mobile:-:*:*:*:*:*:*:*:
Discovery Credit
Thanks to Deral Heiland and Adam Compton of Rapid7, Inc. for reporting this vulnerability.