Session 1.13.0 allows an attacker with physical access to the victim's device to bypass the application's password/pin lock to access user data. This is possible due to lack of adequate security controls to prevent dynamic code manipulation.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
https://fluidattacks.com/advisories/tempest/ | third party advisory issue tracking exploit |
https://github.com/oxen-io/session-android/pull/897 | third party advisory issue tracking exploit |
https://github.com/oxen-io/session-android | product third party advisory |