Juiker app hard-coded its AES key in the source code. A physical attacker, after getting the Android root privilege, can use the AES key to decrypt users’ ciphertext and tamper with it.
Solution:
The product contains hard-coded credentials, such as a password or cryptographic key.
Link | Tags |
---|---|
https://www.twcert.org.tw/tw/cp-132-6630-d4d2f-1.html | vdb entry third party advisory |