An issue was discovered in the A4N (Aremis 4 Nomad) application 1.5.0 for Android. It uses a local database to store data and accounts. However, the password is stored in cleartext. Therefore, an attacker can retrieve the passwords of other users that used the same device.
References
| Link | Resource |
|---|---|
| https://cds.thalesgroup.com/en/tcs-cert/CVE-2022-34910 | |
| https://excellium-services.com/cert-xlm-advisory/CVE-2022-34910 | Third Party Advisory |
| https://www.aremis.com/en_GB/welcome | Not Applicable |
| https://excellium-services.com/cert-xlm-advisory/CVE-2022-34910 | Third Party Advisory |
| https://www.aremis.com/en_GB/welcome | Not Applicable |
Configurations
History
30 May 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Information
Published : 2023-02-27 13:15
Updated : 2025-05-30 16:15
NVD link : CVE-2022-34910
Mitre link : CVE-2022-34910
CVE.ORG link : CVE-2022-34910
JSON object : View
Products Affected
aremis
- aremis_4_nomads
CWE
CWE-312
Cleartext Storage of Sensitive Information
