Vulnerabilites related to F-Secure - F-Secure Mobile Security
CVE-2021-33594 (GCVE-0-2021-33594)
Vulnerability from cvelistv5
Published
2021-08-11 10:28
Modified
2024-08-03 23:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- F-Secure Safe browser for Android vulnerable to Address Bar Spoofing
Summary
An address bar spoofing vulnerability was discovered in Safe Browser for Android. When user clicks on a specially crafted a malicious URL, it appears like a legitimate one on the address bar, while the content comes from other domain and presented in a window, covering the original content. A remote attacker can leverage this to perform address bar spoofing attack.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
F-Secure | F-Secure Mobile Security |
Version: 18.4x < 18.3x* |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:50:43.211Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-33594" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Android" ], "product": "F-Secure Mobile Security", "vendor": "F-Secure", "versions": [ { "lessThan": "18.3x*", "status": "affected", "version": "18.4x", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "An address bar spoofing vulnerability was discovered in Safe Browser for Android. When user clicks on a specially crafted a malicious URL, it appears like a legitimate one on the address bar, while the content comes from other domain and presented in a window, covering the original content. A remote attacker can leverage this to perform address bar spoofing attack." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "F-Secure Safe browser for Android vulnerable to Address Bar Spoofing", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-11T10:28:33", "orgId": "126858f1-1b65-4b74-81ca-7034f7f7723f", "shortName": "F-SecureUS" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-33594" } ], "solutions": [ { "lang": "en", "value": "Upgrade to version 18.4.x or newer from Google Play" } ], "source": { "discovery": "EXTERNAL" }, "title": "F-Secure Safe browser for Android vulnerable to Address Bar Spoofing", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-notifications-us@f-secure.com", "ID": "CVE-2021-33594", "STATE": "PUBLIC", "TITLE": "F-Secure Safe browser for Android vulnerable to Address Bar Spoofing" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "F-Secure Mobile Security", "version": { "version_data": [ { "platform": "Android", "version_affected": "\u003e=", "version_name": "18.3x", "version_value": "18.4x" } ] } } ] }, "vendor_name": "F-Secure" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An address bar spoofing vulnerability was discovered in Safe Browser for Android. When user clicks on a specially crafted a malicious URL, it appears like a legitimate one on the address bar, while the content comes from other domain and presented in a window, covering the original content. A remote attacker can leverage this to perform address bar spoofing attack." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "F-Secure Safe browser for Android vulnerable to Address Bar Spoofing" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame", "refsource": "MISC", "url": "https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame" }, { "name": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories", "refsource": "MISC", "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" }, { "name": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-33594", "refsource": "MISC", "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-33594" } ] }, "solution": [ { "lang": "en", "value": "Upgrade to version 18.4.x or newer from Google Play" } ], "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "126858f1-1b65-4b74-81ca-7034f7f7723f", "assignerShortName": "F-SecureUS", "cveId": "CVE-2021-33594", "datePublished": "2021-08-11T10:28:33", "dateReserved": "2021-05-27T00:00:00", "dateUpdated": "2024-08-03T23:50:43.211Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-28870 (GCVE-0-2022-28870)
Vulnerability from cvelistv5
Published
2022-04-15 10:20
Modified
2024-08-03 06:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Address Bar Spoofing Vulnerability in F-Secure SAFE Browser for Android
Summary
A vulnerability affecting F-Secure SAFE browser was discovered. A maliciously crafted website could make a phishing attack with address bar spoofing as the address bar was not correct if navigation fails.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
F-Secure | F-Secure Mobile Security |
Version: 18.6 < All Version |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:03:53.215Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.f-secure.com/en/home/support/security-advisories" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.f-secure.com/en/home/support/security-advisories/cve-2022-28870" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Android" ], "product": "F-Secure Mobile Security", "vendor": "F-Secure", "versions": [ { "lessThan": "All Version ", "status": "affected", "version": "18.6", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability affecting F-Secure SAFE browser was discovered. A maliciously crafted website could make a phishing attack with address bar spoofing as the address bar was not correct if navigation fails." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Address Bar Spoofing Vulnerability in F-Secure SAFE Browser for Android", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-15T10:20:27", "orgId": "126858f1-1b65-4b74-81ca-7034f7f7723f", "shortName": "F-SecureUS" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.f-secure.com/en/home/support/security-advisories" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.f-secure.com/en/home/support/security-advisories/cve-2022-28870" } ], "solutions": [ { "lang": "en", "value": "FIX: A fix has been released in the automatic update channel since 13th, April 2022. No user action is required." } ], "source": { "discovery": "EXTERNAL" }, "title": "Address Bar Spoofing Vulnerability in F-Secure SAFE Browser for Android", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-notifications-us@f-secure.com", "ID": "CVE-2022-28870", "STATE": "PUBLIC", "TITLE": "Address Bar Spoofing Vulnerability in F-Secure SAFE Browser for Android" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "F-Secure Mobile Security", "version": { "version_data": [ { "platform": "Android", "version_affected": "\u003c", "version_name": "18.6", "version_value": "All Version " } ] } } ] }, "vendor_name": "F-Secure" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability affecting F-Secure SAFE browser was discovered. A maliciously crafted website could make a phishing attack with address bar spoofing as the address bar was not correct if navigation fails." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Address Bar Spoofing Vulnerability in F-Secure SAFE Browser for Android" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.f-secure.com/en/home/support/security-advisories", "refsource": "MISC", "url": "https://www.f-secure.com/en/home/support/security-advisories" }, { "name": "https://www.f-secure.com/en/home/support/security-advisories/cve-2022-28870", "refsource": "MISC", "url": "https://www.f-secure.com/en/home/support/security-advisories/cve-2022-28870" } ] }, "solution": [ { "lang": "en", "value": "FIX: A fix has been released in the automatic update channel since 13th, April 2022. No user action is required." } ], "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "126858f1-1b65-4b74-81ca-7034f7f7723f", "assignerShortName": "F-SecureUS", "cveId": "CVE-2022-28870", "datePublished": "2022-04-15T10:20:27", "dateReserved": "2022-04-08T00:00:00", "dateUpdated": "2024-08-03T06:03:53.215Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-28869 (GCVE-0-2022-28869)
Vulnerability from cvelistv5
Published
2022-04-15 10:21
Modified
2024-08-03 06:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Address Bar Spoofing Vulnerability in F-Secure SAFE Browser for Android
Summary
A vulnerability affecting F-Secure SAFE browser was discovered. A maliciously crafted website could make a phishing attack with address bar spoofing as the browser did not show full URL, such as port number.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
F-Secure | F-Secure Mobile Security |
Version: 18.6 < All Version |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:03:53.135Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.f-secure.com/en/home/support/security-advisories" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.f-secure.com/en/home/support/security-advisories/cve-2022-28869" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Android" ], "product": "F-Secure Mobile Security", "vendor": "F-Secure", "versions": [ { "lessThan": "All Version ", "status": "affected", "version": "18.6", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability affecting F-Secure SAFE browser was discovered. A maliciously crafted website could make a phishing attack with address bar spoofing as the browser did not show full URL, such as port number." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Address Bar Spoofing Vulnerability in F-Secure SAFE Browser for Android", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-15T10:21:55", "orgId": "126858f1-1b65-4b74-81ca-7034f7f7723f", "shortName": "F-SecureUS" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.f-secure.com/en/home/support/security-advisories" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.f-secure.com/en/home/support/security-advisories/cve-2022-28869" } ], "solutions": [ { "lang": "en", "value": "FIX: A fix has been released in the automatic update channel since 13th, April 2022. No user action is required." } ], "source": { "discovery": "EXTERNAL" }, "title": "Address Bar Spoofing Vulnerability in F-Secure SAFE Browser for Android", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-notifications-us@f-secure.com", "ID": "CVE-2022-28869", "STATE": "PUBLIC", "TITLE": "Address Bar Spoofing Vulnerability in F-Secure SAFE Browser for Android" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "F-Secure Mobile Security", "version": { "version_data": [ { "platform": "Android", "version_affected": "\u003c", "version_name": "18.6", "version_value": "All Version " } ] } } ] }, "vendor_name": "F-Secure" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability affecting F-Secure SAFE browser was discovered. A maliciously crafted website could make a phishing attack with address bar spoofing as the browser did not show full URL, such as port number." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Address Bar Spoofing Vulnerability in F-Secure SAFE Browser for Android" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.f-secure.com/en/home/support/security-advisories", "refsource": "MISC", "url": "https://www.f-secure.com/en/home/support/security-advisories" }, { "name": "https://www.f-secure.com/en/home/support/security-advisories/cve-2022-28869", "refsource": "MISC", "url": "https://www.f-secure.com/en/home/support/security-advisories/cve-2022-28869" } ] }, "solution": [ { "lang": "en", "value": "FIX: A fix has been released in the automatic update channel since 13th, April 2022. No user action is required." } ], "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "126858f1-1b65-4b74-81ca-7034f7f7723f", "assignerShortName": "F-SecureUS", "cveId": "CVE-2022-28869", "datePublished": "2022-04-15T10:21:55", "dateReserved": "2022-04-08T00:00:00", "dateUpdated": "2024-08-03T06:03:53.135Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-28872 (GCVE-0-2022-28872)
Vulnerability from cvelistv5
Published
2022-05-12 11:16
Modified
2024-08-03 06:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Address Bar Spoofing Vulnerability
Summary
A vulnerability affecting F-Secure SAFE browser was discovered. A maliciously crafted website could make a phishing attack with address bar spoofing as the address bar was not correct if navigation fails in a loop.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
F-Secure | F-Secure Mobile Security |
Version: unspecified < 19.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:03:53.215Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.f-secure.com/en/home/support/security-advisories" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Android" ], "product": "F-Secure Mobile Security", "vendor": "F-Secure", "versions": [ { "lessThan": "19.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability affecting F-Secure SAFE browser was discovered. A maliciously crafted website could make a phishing attack with address bar spoofing as the address bar was not correct if navigation fails in a loop." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Address Bar Spoofing Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-12T19:33:06", "orgId": "126858f1-1b65-4b74-81ca-7034f7f7723f", "shortName": "F-SecureUS" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.f-secure.com/en/home/support/security-advisories" } ], "solutions": [ { "lang": "en", "value": "FIX : A fix has been released in the automatic update channel since 3rd May 2022. No user action is required." } ], "source": { "discovery": "EXTERNAL" }, "title": "Address Bar Spoofing Vulnerability in F-Secure SAFE Browser for Android", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-notifications-us@f-secure.com", "ID": "CVE-2022-28872", "STATE": "PUBLIC", "TITLE": "Address Bar Spoofing Vulnerability in F-Secure SAFE Browser for Android" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "F-Secure Mobile Security", "version": { "version_data": [ { "platform": "Android", "version_affected": "\u003c", "version_value": "19.0" } ] } } ] }, "vendor_name": "F-Secure" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability affecting F-Secure SAFE browser was discovered. A maliciously crafted website could make a phishing attack with address bar spoofing as the address bar was not correct if navigation fails in a loop." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Address Bar Spoofing Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.f-secure.com/en/home/support/security-advisories", "refsource": "MISC", "url": "https://www.f-secure.com/en/home/support/security-advisories" } ] }, "solution": [ { "lang": "en", "value": "FIX : A fix has been released in the automatic update channel since 3rd May 2022. No user action is required." } ], "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "126858f1-1b65-4b74-81ca-7034f7f7723f", "assignerShortName": "F-SecureUS", "cveId": "CVE-2022-28872", "datePublished": "2022-05-12T11:16:00", "dateReserved": "2022-04-08T00:00:00", "dateUpdated": "2024-08-03T06:03:53.215Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-40834 (GCVE-0-2021-40834)
Vulnerability from cvelistv5
Published
2021-12-10 13:38
Modified
2024-08-04 02:51
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- User interface Spoofing in F-Secure SAFE browser for Android
Summary
A user interface overlay vulnerability was discovered in F-secure SAFE Browser for Android. When user click on a specially crafted seemingly legitimate URL SAFE browser goes into full screen and hides the user interface. A remote attacker can leverage this to perform spoofing attack.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
F-Secure | F-Secure Mobile Security |
Version: 18.5x < 17.9* |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:51:07.506Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-40834" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Android" ], "product": "F-Secure Mobile Security", "vendor": "F-Secure", "versions": [ { "lessThan": "17.9*", "status": "affected", "version": "18.5x", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A user interface overlay vulnerability was discovered in F-secure SAFE Browser for Android. When user click on a specially crafted seemingly legitimate URL SAFE browser goes into full screen and hides the user interface. A remote attacker can leverage this to perform spoofing attack." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "User interface Spoofing in F-Secure SAFE browser for Android", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-10T16:43:00", "orgId": "126858f1-1b65-4b74-81ca-7034f7f7723f", "shortName": "F-SecureUS" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-40834" } ], "solutions": [ { "lang": "en", "value": "FIX - Upgrade to version 18.5.x which is available in Google play.\n" } ], "source": { "discovery": "EXTERNAL" }, "title": "User interface Spoofing in F-Secure SAFE browser for Android", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-notifications-us@f-secure.com", "ID": "CVE-2021-40834", "STATE": "PUBLIC", "TITLE": "User interface Spoofing in F-Secure SAFE browser for Android" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "F-Secure Mobile Security", "version": { "version_data": [ { "platform": "Android", "version_affected": "\u003e", "version_name": "17.9", "version_value": "18.5x" } ] } } ] }, "vendor_name": "F-Secure" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A user interface overlay vulnerability was discovered in F-secure SAFE Browser for Android. When user click on a specially crafted seemingly legitimate URL SAFE browser goes into full screen and hides the user interface. A remote attacker can leverage this to perform spoofing attack." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "User interface Spoofing in F-Secure SAFE browser for Android" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame", "refsource": "MISC", "url": "https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame" }, { "name": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-40834", "refsource": "MISC", "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-40834" } ] }, "solution": [ { "lang": "en", "value": "FIX - Upgrade to version 18.5.x which is available in Google play.\n" } ], "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "126858f1-1b65-4b74-81ca-7034f7f7723f", "assignerShortName": "F-SecureUS", "cveId": "CVE-2021-40834", "datePublished": "2021-12-10T13:38:46", "dateReserved": "2021-09-09T00:00:00", "dateUpdated": "2024-08-04T02:51:07.506Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-33596 (GCVE-0-2021-33596)
Vulnerability from cvelistv5
Published
2021-08-05 19:26
Modified
2024-08-03 23:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Fake Apple login prompt in F-Secure SAFE browser for iOS
Summary
Showing the legitimate URL in the address bar while loading the content from other domain. This makes the user believe that the content is served by a legit domain. Exploiting the vulnerability requires the user to click on a specially crafted, seemingly legitimate URL containing an embedded malicious redirect while using F-Secure Safe Browser for iOS.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
F-Secure | F-Secure Mobile Security |
Version: 18.3x < 18.4x |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:50:43.276Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-33596" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "iOS" ], "product": "F-Secure Mobile Security", "vendor": "F-Secure", "versions": [ { "lessThan": "18.4x", "status": "affected", "version": "18.3x", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Showing the legitimate URL in the address bar while loading the content from other domain. This makes the user believe that the content is served by a legit domain. Exploiting the vulnerability requires the user to click on a specially crafted, seemingly legitimate URL containing an embedded malicious redirect while using F-Secure Safe Browser for iOS." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Fake Apple login prompt in F-Secure SAFE browser for iOS", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-11T10:35:30", "orgId": "126858f1-1b65-4b74-81ca-7034f7f7723f", "shortName": "F-SecureUS" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-33596" } ], "solutions": [ { "lang": "en", "value": "Upgrade to version 18.4.x or newer from the App Store " } ], "source": { "discovery": "EXTERNAL" }, "title": "Fake Apple login prompt in F-Secure SAFE browser for iOS", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-notifications-us@f-secure.com", "ID": "CVE-2021-33596", "STATE": "PUBLIC", "TITLE": "Fake Apple login prompt in F-Secure SAFE browser for iOS" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "F-Secure Mobile Security", "version": { "version_data": [ { "platform": "iOS", "version_affected": "\u003c", "version_name": "18.3x", "version_value": "18.4x" } ] } } ] }, "vendor_name": "F-Secure" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Showing the legitimate URL in the address bar while loading the content from other domain. This makes the user believe that the content is served by a legit domain. Exploiting the vulnerability requires the user to click on a specially crafted, seemingly legitimate URL containing an embedded malicious redirect while using F-Secure Safe Browser for iOS." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Fake Apple login prompt in F-Secure SAFE browser for iOS" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame", "refsource": "MISC", "url": "https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame" }, { "name": "https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame", "refsource": "MISC", "url": "https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame" }, { "name": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories", "refsource": "MISC", "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" }, { "name": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-33596", "refsource": "MISC", "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-33596" }, { "name": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories", "refsource": "MISC", "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" } ] }, "solution": [ { "lang": "en", "value": "Upgrade to version 18.4.x or newer from the App Store " } ], "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "126858f1-1b65-4b74-81ca-7034f7f7723f", "assignerShortName": "F-SecureUS", "cveId": "CVE-2021-33596", "datePublished": "2021-08-05T19:26:50", "dateReserved": "2021-05-27T00:00:00", "dateUpdated": "2024-08-03T23:50:43.276Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-28868 (GCVE-0-2022-28868)
Vulnerability from cvelistv5
Published
2022-04-15 10:21
Modified
2024-08-03 06:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Address Bar Spoofing Vulnerability in F-Secure SAFE Browser for Android
Summary
An Address bar spoofing vulnerability was discovered in Safe Browser for Android. When user clicks on a specially crafted malicious webpage/URL, user may be tricked for a short period of time (until the page loads) to think content may be coming from a valid domain, while the content comes from the attacker controlled site.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
F-Secure | F-Secure Mobile Security |
Version: 18.6 < All Version |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:03:53.153Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.f-secure.com/en/home/support/security-advisories" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.f-secure.com/en/home/support/security-advisories/cve-2022-28868" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Android" ], "product": "F-Secure Mobile Security", "vendor": "F-Secure", "versions": [ { "lessThan": "All Version ", "status": "affected", "version": "18.6", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "An Address bar spoofing vulnerability was discovered in Safe Browser for Android. When user clicks on a specially crafted malicious webpage/URL, user may be tricked for a short period of time (until the page loads) to think content may be coming from a valid domain, while the content comes from the attacker controlled site." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Address Bar Spoofing Vulnerability in F-Secure SAFE Browser for Android", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-15T10:21:09", "orgId": "126858f1-1b65-4b74-81ca-7034f7f7723f", "shortName": "F-SecureUS" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.f-secure.com/en/home/support/security-advisories" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.f-secure.com/en/home/support/security-advisories/cve-2022-28868" } ], "solutions": [ { "lang": "en", "value": "FIX: A fix has been released in the automatic update channel since 13th, April 2022. No user action is required." } ], "source": { "discovery": "EXTERNAL" }, "title": "Address Bar Spoofing Vulnerability in F-Secure SAFE Browser for Android", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-notifications-us@f-secure.com", "ID": "CVE-2022-28868", "STATE": "PUBLIC", "TITLE": "Address Bar Spoofing Vulnerability in F-Secure SAFE Browser for Android" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "F-Secure Mobile Security", "version": { "version_data": [ { "platform": "Android", "version_affected": "\u003c", "version_name": "18.6", "version_value": "All Version " } ] } } ] }, "vendor_name": "F-Secure" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An Address bar spoofing vulnerability was discovered in Safe Browser for Android. When user clicks on a specially crafted malicious webpage/URL, user may be tricked for a short period of time (until the page loads) to think content may be coming from a valid domain, while the content comes from the attacker controlled site." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Address Bar Spoofing Vulnerability in F-Secure SAFE Browser for Android" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.f-secure.com/en/home/support/security-advisories", "refsource": "MISC", "url": "https://www.f-secure.com/en/home/support/security-advisories" }, { "name": "https://www.f-secure.com/en/home/support/security-advisories/cve-2022-28868", "refsource": "MISC", "url": "https://www.f-secure.com/en/home/support/security-advisories/cve-2022-28868" } ] }, "solution": [ { "lang": "en", "value": "FIX: A fix has been released in the automatic update channel since 13th, April 2022. No user action is required." } ], "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "126858f1-1b65-4b74-81ca-7034f7f7723f", "assignerShortName": "F-SecureUS", "cveId": "CVE-2022-28868", "datePublished": "2022-04-15T10:21:09", "dateReserved": "2022-04-08T00:00:00", "dateUpdated": "2024-08-03T06:03:53.153Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-33595 (GCVE-0-2021-33595)
Vulnerability from cvelistv5
Published
2021-08-11 10:28
Modified
2024-08-03 23:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- F-Secure Safe browser for iOS vulnerable to Address Bar Spoofing
Summary
A address bar spoofing vulnerability was discovered in Safe Browser for iOS. Showing the legitimate URL in the address bar while loading the content from other domain. This makes the user believe that the content is served by a legit domain. A remote attacker can leverage this to perform address bar spoofing attack.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
F-Secure | F-Secure Mobile Security |
Version: 18.4x < 18.3x* |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:50:43.177Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-33595" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "iOS" ], "product": "F-Secure Mobile Security", "vendor": "F-Secure", "versions": [ { "lessThan": "18.3x*", "status": "affected", "version": "18.4x", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A address bar spoofing vulnerability was discovered in Safe Browser for iOS. Showing the legitimate URL in the address bar while loading the content from other domain. This makes the user believe that the content is served by a legit domain. A remote attacker can leverage this to perform address bar spoofing attack." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "F-Secure Safe browser for iOS vulnerable to Address Bar Spoofing", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-11T10:28:27", "orgId": "126858f1-1b65-4b74-81ca-7034f7f7723f", "shortName": "F-SecureUS" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-33595" } ], "solutions": [ { "lang": "en", "value": "Upgrade to version 18.4.x or newer from the App Store " } ], "source": { "discovery": "EXTERNAL" }, "title": "F-Secure Safe browser for iOS vulnerable to Address Bar Spoofing", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-notifications-us@f-secure.com", "ID": "CVE-2021-33595", "STATE": "PUBLIC", "TITLE": "F-Secure Safe browser for iOS vulnerable to Address Bar Spoofing" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "F-Secure Mobile Security", "version": { "version_data": [ { "platform": "iOS", "version_affected": "\u003e", "version_name": "18.3x", "version_value": "18.4x" } ] } } ] }, "vendor_name": "F-Secure" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A address bar spoofing vulnerability was discovered in Safe Browser for iOS. Showing the legitimate URL in the address bar while loading the content from other domain. This makes the user believe that the content is served by a legit domain. A remote attacker can leverage this to perform address bar spoofing attack." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "F-Secure Safe browser for iOS vulnerable to Address Bar Spoofing" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame", "refsource": "MISC", "url": "https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame" }, { "name": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories", "refsource": "MISC", "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" }, { "name": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-33595", "refsource": "MISC", "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-33595" } ] }, "solution": [ { "lang": "en", "value": "Upgrade to version 18.4.x or newer from the App Store " } ], "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "126858f1-1b65-4b74-81ca-7034f7f7723f", "assignerShortName": "F-SecureUS", "cveId": "CVE-2021-33595", "datePublished": "2021-08-11T10:28:27", "dateReserved": "2021-05-27T00:00:00", "dateUpdated": "2024-08-03T23:50:43.177Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-28873 (GCVE-0-2022-28873)
Vulnerability from cvelistv5
Published
2022-05-12 11:16
Modified
2024-08-03 06:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Address Bar Spoofing Vulnerability
Summary
A vulnerability affecting F-Secure SAFE browser was discovered. An attacker can potentially exploit Javascript window.open functionality in SAFE Browser which could lead address bar spoofing attacks.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
F-Secure | F-Secure Mobile Security |
Version: 19.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:03:53.217Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.f-secure.com/en/home/support/security-advisories" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.f-secure.com/en/home/support/security-advisories/cve-2022-28873" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Android" ], "product": "F-Secure Mobile Security", "vendor": "F-Secure", "versions": [ { "status": "affected", "version": "19.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability affecting F-Secure SAFE browser was discovered. An attacker can potentially exploit Javascript window.open functionality in SAFE Browser which could lead address bar spoofing attacks." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Address Bar Spoofing Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-12T11:16:14", "orgId": "126858f1-1b65-4b74-81ca-7034f7f7723f", "shortName": "F-SecureUS" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.f-secure.com/en/home/support/security-advisories" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.f-secure.com/en/home/support/security-advisories/cve-2022-28873" } ], "solutions": [ { "lang": "en", "value": "FIX : A fix has been released in the automatic update channel since 3rd May 2022. No user action is required." } ], "source": { "discovery": "EXTERNAL" }, "title": "Multiple Address Bar Spoofing Vulnerability in F-Secure SAFE Browser for Android", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-notifications-us@f-secure.com", "ID": "CVE-2022-28873", "STATE": "PUBLIC", "TITLE": "Multiple Address Bar Spoofing Vulnerability in F-Secure SAFE Browser for Android" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "F-Secure Mobile Security", "version": { "version_data": [ { "platform": "Android", "version_affected": "=", "version_value": "19.0" } ] } } ] }, "vendor_name": "F-Secure" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability affecting F-Secure SAFE browser was discovered. An attacker can potentially exploit Javascript window.open functionality in SAFE Browser which could lead address bar spoofing attacks." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Address Bar Spoofing Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.f-secure.com/en/home/support/security-advisories", "refsource": "MISC", "url": "https://www.f-secure.com/en/home/support/security-advisories" }, { "name": "https://www.f-secure.com/en/home/support/security-advisories/cve-2022-28873", "refsource": "MISC", "url": "https://www.f-secure.com/en/home/support/security-advisories/cve-2022-28873" } ] }, "solution": [ { "lang": "en", "value": "FIX : A fix has been released in the automatic update channel since 3rd May 2022. No user action is required." } ], "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "126858f1-1b65-4b74-81ca-7034f7f7723f", "assignerShortName": "F-SecureUS", "cveId": "CVE-2022-28873", "datePublished": "2022-05-12T11:16:14", "dateReserved": "2022-04-08T00:00:00", "dateUpdated": "2024-08-03T06:03:53.217Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-40835 (GCVE-0-2021-40835)
Vulnerability from cvelistv5
Published
2021-12-16 10:58
Modified
2024-08-04 02:51
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- URL Address Bar Spoofing in F-Secure SAFE Browser for iOS
Summary
An URL Address bar spoofing vulnerability was discovered in Safe Browser for iOS. When user clicks on a specially crafted a malicious URL, if user does not carefully pay attention to url, user may be tricked to think content may be coming from a valid domain, while it comes from another. This is performed by using a very long username part of the url so that user cannot see the domain name. A remote attacker can leverage this to perform url address bar spoofing attack. The fix is, browser no longer shows the user name part in address bar.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
F-Secure | F-Secure Mobile Security |
Version: 18.3 < 18.5 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:51:07.421Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "iOS" ], "product": "F-Secure Mobile Security", "vendor": "F-Secure", "versions": [ { "lessThan": "18.5", "status": "affected", "version": "18.3", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "An URL Address bar spoofing vulnerability was discovered in Safe Browser for iOS. When user clicks on a specially crafted a malicious URL, if user does not carefully pay attention to url, user may be tricked to think content may be coming from a valid domain, while it comes from another. This is performed by using a very long username part of the url so that user cannot see the domain name. A remote attacker can leverage this to perform url address bar spoofing attack. The fix is, browser no longer shows the user name part in address bar." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "URL Address Bar Spoofing in F-Secure SAFE Browser for iOS", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-16T16:14:13", "orgId": "126858f1-1b65-4b74-81ca-7034f7f7723f", "shortName": "F-SecureUS" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" } ], "solutions": [ { "lang": "en", "value": "Upgrade to version 18.5 or newer from the App Store " } ], "source": { "discovery": "EXTERNAL" }, "title": "URL Address Bar Spoofing in F-Secure SAFE Browser for iOS", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-notifications-us@f-secure.com", "ID": "CVE-2021-40835", "STATE": "PUBLIC", "TITLE": "URL Address Bar Spoofing in F-Secure SAFE Browser for iOS" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "F-Secure Mobile Security", "version": { "version_data": [ { "platform": "iOS", "version_affected": "\u003c", "version_name": "18.3", "version_value": "18.5" } ] } } ] }, "vendor_name": "F-Secure" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An URL Address bar spoofing vulnerability was discovered in Safe Browser for iOS. When user clicks on a specially crafted a malicious URL, if user does not carefully pay attention to url, user may be tricked to think content may be coming from a valid domain, while it comes from another. This is performed by using a very long username part of the url so that user cannot see the domain name. A remote attacker can leverage this to perform url address bar spoofing attack. The fix is, browser no longer shows the user name part in address bar." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "URL Address Bar Spoofing in F-Secure SAFE Browser for iOS" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame", "refsource": "MISC", "url": "https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame" }, { "name": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories", "refsource": "MISC", "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories" } ] }, "solution": [ { "lang": "en", "value": "Upgrade to version 18.5 or newer from the App Store " } ], "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "126858f1-1b65-4b74-81ca-7034f7f7723f", "assignerShortName": "F-SecureUS", "cveId": "CVE-2021-40835", "datePublished": "2021-12-16T10:58:55", "dateReserved": "2021-09-09T00:00:00", "dateUpdated": "2024-08-04T02:51:07.421Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }