Health Covidsafe vulnerabilities

7 known vulnerabilities affecting health/covidsafe.

Total CVEs
7
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH2MEDIUM4

Vulnerabilities

Page 1 of 1
CVE-2020-14292MEDIUMCVSS 5.7≤ 1.0.212020-09-09
CVE-2020-14292 [MEDIUM] CVE-2020-14292: In the COVIDSafe application through 1.0.21 for Android, unsafe use of the Bluetooth transport optio In the COVIDSafe application through 1.0.21 for Android, unsafe use of the Bluetooth transport option in the GATT connection allows attackers to trick the application into establishing a connection over Bluetooth BR/EDR transport, which reveals the public Bluetooth address of the victim's phone without authorisation, bypassing the Bluetooth address randomis
nvd
CVE-2020-12856CRITICALCVSS 9.8≤ 1.0.172020-05-18
CVE-2020-12856 [CRITICAL] CVE-2020-12856: OpenTrace, as used in COVIDSafe through v1.0.17, TraceTogether, ABTraceTogether, and other applicati OpenTrace, as used in COVIDSafe through v1.0.17, TraceTogether, ABTraceTogether, and other applications on iOS and Android, allows remote attackers to conduct long-term re-identification attacks and possibly have unspecified other impact, because of how Bluetooth is used.
nvd
CVE-2020-12858HIGHCVSS 7.5fixed in 1.0.172020-05-18
CVE-2020-12858 [HIGH] CWE-330 CVE-2020-12858: Non-reinitialisation of random data in the advertising payload in COVIDSafe v1.0.15 and v1.0.16 allo Non-reinitialisation of random data in the advertising payload in COVIDSafe v1.0.15 and v1.0.16 allows a remote attacker to re-identify Android devices running COVIDSafe by scanning for their advertising beacons.
nvd
CVE-2020-12857HIGHCVSS 7.5fixed in 1.0.172020-05-18
CVE-2020-12857 [HIGH] CWE-459 CVE-2020-12857: Caching of GATT characteristic values (TempID) in COVIDSafe v1.0.15 and v1.0.16 allows a remote atta Caching of GATT characteristic values (TempID) in COVIDSafe v1.0.15 and v1.0.16 allows a remote attacker to long-term re-identify an Android device running COVIDSafe.
nvd
CVE-2020-12859MEDIUMCVSS 5.3≤ 1.0.172020-05-18
CVE-2020-12859 [MEDIUM] CWE-312 CVE-2020-12859: Unnecessary fields in the OpenTrace/BlueTrace protocol in COVIDSafe through v1.0.17 allow a remote a Unnecessary fields in the OpenTrace/BlueTrace protocol in COVIDSafe through v1.0.17 allow a remote attacker to identify a device model by observing cleartext payload data. This allows re-identification of devices, especially less common phone models or those in low-density situations.
nvd
CVE-2020-12860MEDIUMCVSS 5.3≤ 1.0.172020-05-18
CVE-2020-12860 [MEDIUM] CWE-269 CVE-2020-12860: COVIDSafe through v1.0.17 allows a remote attacker to access phone name and model information becaus COVIDSafe through v1.0.17 allows a remote attacker to access phone name and model information because a BLE device can have four roles and COVIDSafe uses all of them. This allows for re-identification of a device, and potentially identification of the owner's name.
nvd
CVE-2020-12717MEDIUMCVSS 6.5v1.0v1.12020-05-14
CVE-2020-12717 [MEDIUM] CVE-2020-12717: The COVIDSafe (Australia) app 1.0 and 1.1 for iOS allows a remote attacker to crash the app, and con The COVIDSafe (Australia) app 1.0 and 1.1 for iOS allows a remote attacker to crash the app, and consequently interfere with COVID-19 contact tracing, via a Bluetooth advertisement containing manufacturer data that is too short. This occurs because of an erroneous OpenTrace manuData.subdata call. The ABTraceTogether (Alberta), ProteGO (Poland), and TraceTog
nvd