Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2019-6024
Analyzed
More InfoOfficial Page
Source-vultures@jpcert.or.jp
View Known Exploited Vulnerability (KEV) details
Published At-26 Dec, 2019 | 16:15
Updated At-02 Jan, 2020 | 19:32

Rakuma App for Android version 7.15.0 and earlier, and for iOS version 7.16.4 and earlier allows an attacker to bypass authentication and obtain the user's authentication information via a malicious application created by the third party.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.16.5MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
Primary2.04.3MEDIUM
AV:N/AC:M/Au:N/C:P/I:N/A:N
CPE Matches

rakuten
rakuten
>>rakuma>>Versions up to 7.15.0(inclusive)
cpe:2.3:a:rakuten:rakuma:*:*:*:*:*:android:*:*
rakuten
rakuten
>>rakuma>>Versions up to 7.16.4(inclusive)
cpe:2.3:a:rakuten:rakuma:*:*:*:*:*:iphone_os:*:*
Weaknesses
CWE IDTypeSource
CWE-522Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://jvn.jp/en/jp/JVN41566067/index.htmlvultures@jpcert.or.jp
Third Party Advisory
VDB Entry
https://apps.apple.com/jp/app/furimaapuri-furiru-fril-fasshon/id523497998vultures@jpcert.or.jp
Product
Release Notes
https://play.google.com/store/apps/details?id=jp.co.fablic.fril&hl=envultures@jpcert.or.jp
Product
Change History
0Changes found

Details not found