The TrackR Bravo mobile app stores the account password used to authenticate to the cloud API in cleartext in the cache.db file. Updated apps, version 5.1.6 for iOS and 2.2.5 for Android, have been released by the vendor to address the vulnerabilities in CVE-2016-6538, CVE-2016-6539, CVE-2016-6540 and CVE-2016-6541.
The product stores sensitive information in cleartext in a file, or on disk.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/93874 | vdb entry third party advisory |
https://www.kb.cert.org/vuls/id/TNOY-AF3KCZ | third party advisory us government resource |
https://blog.rapid7.com/2016/10/25/multiple-bluetooth-low-energy-ble-tracker-vulnerabilities/ | third party advisory exploit |
https://www.kb.cert.org/vuls/id/617567 | third party advisory us government resource |