The Open Whisper Signal app before 2.23.2 for iOS allows physically proximate attackers to bypass the screen locker feature via certain rapid sequences of actions that include app opening, clicking on cancel, and using the home button.
                
            References
                    | Link | Resource | 
|---|---|
| http://nint.en.do/Signal-Bypass-Screen-locker.php | Broken Link Third Party Advisory | 
| https://github.com/signalapp/Signal-iOS/commit/018a35df7b42b4941cb4dfc9f462b37c3fafd9e9 | Patch Third Party Advisory | 
| https://github.com/signalapp/Signal-iOS/commits/release/2.23.2 | Issue Tracking Patch Third Party Advisory | 
| http://nint.en.do/Signal-Bypass-Screen-locker.php | Broken Link Third Party Advisory | 
| https://github.com/signalapp/Signal-iOS/commit/018a35df7b42b4941cb4dfc9f462b37c3fafd9e9 | Patch Third Party Advisory | 
| https://github.com/signalapp/Signal-iOS/commits/release/2.23.2 | Issue Tracking Patch Third Party Advisory | 
Configurations
                    History
                    No history.
Information
                Published : 2018-04-10 05:29
Updated : 2024-11-21 04:15
NVD link : CVE-2018-9840
Mitre link : CVE-2018-9840
CVE.ORG link : CVE-2018-9840
JSON object : View
Products Affected
                signal
- signal
 
CWE
                