An issue was discovered in the A4N (Aremis 4 Nomad) application 1.5.0 for Android. It possesses an authentication mechanism; however, some features do not require any token or cookie in a request. Therefore, an attacker may send a simple HTTP request to the right endpoint, and obtain authorization to retrieve application data.
References
Link | Resource |
---|---|
https://excellium-services.com/cert-xlm-advisory/CVE-2022-34908 | Third Party Advisory |
https://www.aremis.com/en_GB/welcome | Not Applicable |
https://excellium-services.com/cert-xlm-advisory/CVE-2022-34908 | Third Party Advisory |
https://www.aremis.com/en_GB/welcome | Not Applicable |
Configurations
History
10 Mar 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-306 |
Information
Published : 2023-02-27 13:15
Updated : 2025-03-10 20:15
NVD link : CVE-2022-34908
Mitre link : CVE-2022-34908
CVE.ORG link : CVE-2022-34908
JSON object : View
Products Affected
aremis
- aremis_4_nomads