CVE-2022-43543 (GCVE-0-2022-43543)
Vulnerability from cvelistv5 – Published: 2022-12-21 00:00 – Updated: 2025-04-16 17:36
VLAI?
Summary
KDDI +Message App, NTT DOCOMO +Message App, and SoftBank +Message App contain a vulnerability caused by improper handling of Unicode control characters. +Message App displays text unprocessed, even when control characters are contained, and the text is shown based on Unicode control character's specifications. Therefore, a crafted text may display misleading web links. As a result, a spoofed URL may be displayed and phishing attacks may be conducted. Affected products and versions are as follows: KDDI +Message App for Android prior to version 3.9.2 and +Message App for iOS prior to version 3.9.4, NTT DOCOMO +Message App for Android prior to version 54.49.0500 and +Message App for iOS prior to version 3.9.4, and SoftBank +Message App for Android prior to version 12.9.5 and +Message App for iOS prior to version 3.9.4
Severity ?
5.4 (Medium)
CWE
- User Interface (UI) Misrepresentation of Critical Information
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| KDDI CORPORATION, NTT DOCOMO, INC., and SoftBank Corp. | KDDI +Message App for Android and for iOS, NTT DOCOMO +Message App for Android and for iOS, and SoftBank +Message App for Android and for iOS |
Affected:
KDDI +Message App for Android prior to version 3.9.2 and +Message App for iOS prior to version 3.9.4, NTT DOCOMO +Message App for Android prior to version 54.49.0500 and +Message App for iOS prior to version 3.9.4, and SoftBank +Message App for Android prior to version 12.9.5 and +Message App for iOS prior to version 3.9.4
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T13:32:59.662Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.au.com/mobile/service/plus-message/information/"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.docomo.ne.jp/service/plus_message/"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.softbank.jp/mobile/service/plus-message/"
},
{
"tags": [
"x_transferred"
],
"url": "https://jvn.jp/en/jp/JVN43561812/index.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2022-43543",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-16T17:36:38.691998Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-116",
"description": "CWE-116 Improper Encoding or Escaping of Output",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-04-16T17:36:43.679Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "KDDI +Message App for Android and for iOS, NTT DOCOMO +Message App for Android and for iOS, and SoftBank +Message App for Android and for iOS",
"vendor": "KDDI CORPORATION, NTT DOCOMO, INC., and SoftBank Corp.",
"versions": [
{
"status": "affected",
"version": "KDDI +Message App for Android prior to version 3.9.2 and +Message App for iOS prior to version 3.9.4, NTT DOCOMO +Message App for Android prior to version 54.49.0500 and +Message App for iOS prior to version 3.9.4, and SoftBank +Message App for Android prior to version 12.9.5 and +Message App for iOS prior to version 3.9.4"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "KDDI +Message App, NTT DOCOMO +Message App, and SoftBank +Message App contain a vulnerability caused by improper handling of Unicode control characters. +Message App displays text unprocessed, even when control characters are contained, and the text is shown based on Unicode control character\u0027s specifications. Therefore, a crafted text may display misleading web links. As a result, a spoofed URL may be displayed and phishing attacks may be conducted. Affected products and versions are as follows: KDDI +Message App for Android prior to version 3.9.2 and +Message App for iOS prior to version 3.9.4, NTT DOCOMO +Message App for Android prior to version 54.49.0500 and +Message App for iOS prior to version 3.9.4, and SoftBank +Message App for Android prior to version 12.9.5 and +Message App for iOS prior to version 3.9.4"
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "User Interface (UI) Misrepresentation of Critical Information",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-12-21T00:00:00.000Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"url": "https://www.au.com/mobile/service/plus-message/information/"
},
{
"url": "https://www.docomo.ne.jp/service/plus_message/"
},
{
"url": "https://www.softbank.jp/mobile/service/plus-message/"
},
{
"url": "https://jvn.jp/en/jp/JVN43561812/index.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2022-43543",
"datePublished": "2022-12-21T00:00:00.000Z",
"dateReserved": "2022-12-14T00:00:00.000Z",
"dateUpdated": "2025-04-16T17:36:43.679Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:docomo:\\\\+_message:*:*:*:*:*:iphone_os:*:*\", \"versionEndExcluding\": \"3.9.4\", \"matchCriteriaId\": \"CE90138C-C109-4CDE-8C65-5859A39EBB05\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:docomo:\\\\+_message:*:*:*:*:*:android:*:*\", \"versionEndExcluding\": \"54.49.0500\", \"matchCriteriaId\": \"FA543127-2AE3-4AC8-B9A9-616D747BA9A3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:kddi:\\\\+_message:*:*:*:*:*:android:*:*\", \"versionEndExcluding\": \"3.9.2\", \"matchCriteriaId\": \"E841EC35-5A46-480C-98B5-EE8FCCBE6D51\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:kddi:\\\\+_message:*:*:*:*:*:iphone_os:*:*\", \"versionEndExcluding\": \"3.9.4\", \"matchCriteriaId\": \"F6F9AB9C-C30D-4AAA-B290-0A943F57AFFD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:softbank:\\\\+_message:*:*:*:*:*:iphone_os:*:*\", \"versionEndExcluding\": \"3.9.4\", \"matchCriteriaId\": \"0F80D1CB-91BD-4235-AD63-24E97D1CFA2D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:softbank:\\\\+_message:*:*:*:*:*:android:*:*\", \"versionEndExcluding\": \"12.9.5\", \"matchCriteriaId\": \"61823D93-B19D-491B-B920-13C456071B86\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"KDDI +Message App, NTT DOCOMO +Message App, and SoftBank +Message App contain a vulnerability caused by improper handling of Unicode control characters. +Message App displays text unprocessed, even when control characters are contained, and the text is shown based on Unicode control character\u0027s specifications. Therefore, a crafted text may display misleading web links. As a result, a spoofed URL may be displayed and phishing attacks may be conducted. Affected products and versions are as follows: KDDI +Message App for Android prior to version 3.9.2 and +Message App for iOS prior to version 3.9.4, NTT DOCOMO +Message App for Android prior to version 54.49.0500 and +Message App for iOS prior to version 3.9.4, and SoftBank +Message App for Android prior to version 12.9.5 and +Message App for iOS prior to version 3.9.4\"}, {\"lang\": \"es\", \"value\": \"La aplicaci\\u00f3n KDDI +Message, la aplicaci\\u00f3n NTT DOCOMO +Message y la aplicaci\\u00f3n SoftBank +Message contienen una vulnerabilidad causada por el manejo inadecuado de los caracteres de control Unicode. La aplicaci\\u00f3n +Message muestra texto sin procesar, incluso cuando contiene caracteres de control, y el texto se muestra seg\\u00fan las especificaciones de los caracteres de control Unicode. Por lo tanto, un texto elaborado puede mostrar enlaces web enga\\u00f1osos. Como resultado, se puede mostrar una URL falsificada y se pueden realizar ataques de phishing. Los productos y versiones afectados son los siguientes: KDDI +Message App para Android anterior a la versi\\u00f3n 3.9.2 y +Message App para iOS anterior a la versi\\u00f3n 3.9.4, NTT DOCOMO +Message App para Android anterior a la versi\\u00f3n 54.49.0500 y +Message App para iOS anteriores a la versi\\u00f3n 3.9.4 y SoftBank +Aplicaci\\u00f3n de mensajes para Android anteriores a la versi\\u00f3n 12.9.5 y Aplicaci\\u00f3n +Message para iOS anteriores a la versi\\u00f3n 3.9.4\"}]",
"id": "CVE-2022-43543",
"lastModified": "2024-11-21T07:26:44.970",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N\", \"baseScore\": 5.4, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 2.5}]}",
"published": "2022-12-21T09:15:07.907",
"references": "[{\"url\": \"https://jvn.jp/en/jp/JVN43561812/index.html\", \"source\": \"vultures@jpcert.or.jp\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.au.com/mobile/service/plus-message/information/\", \"source\": \"vultures@jpcert.or.jp\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.docomo.ne.jp/service/plus_message/\", \"source\": \"vultures@jpcert.or.jp\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.softbank.jp/mobile/service/plus-message/\", \"source\": \"vultures@jpcert.or.jp\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://jvn.jp/en/jp/JVN43561812/index.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.au.com/mobile/service/plus-message/information/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.docomo.ne.jp/service/plus_message/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.softbank.jp/mobile/service/plus-message/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2022-43543\",\"sourceIdentifier\":\"vultures@jpcert.or.jp\",\"published\":\"2022-12-21T09:15:07.907\",\"lastModified\":\"2025-04-16T18:15:57.533\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"KDDI +Message App, NTT DOCOMO +Message App, and SoftBank +Message App contain a vulnerability caused by improper handling of Unicode control characters. +Message App displays text unprocessed, even when control characters are contained, and the text is shown based on Unicode control character\u0027s specifications. Therefore, a crafted text may display misleading web links. As a result, a spoofed URL may be displayed and phishing attacks may be conducted. Affected products and versions are as follows: KDDI +Message App for Android prior to version 3.9.2 and +Message App for iOS prior to version 3.9.4, NTT DOCOMO +Message App for Android prior to version 54.49.0500 and +Message App for iOS prior to version 3.9.4, and SoftBank +Message App for Android prior to version 12.9.5 and +Message App for iOS prior to version 3.9.4\"},{\"lang\":\"es\",\"value\":\"La aplicaci\u00f3n KDDI +Message, la aplicaci\u00f3n NTT DOCOMO +Message y la aplicaci\u00f3n SoftBank +Message contienen una vulnerabilidad causada por el manejo inadecuado de los caracteres de control Unicode. La aplicaci\u00f3n +Message muestra texto sin procesar, incluso cuando contiene caracteres de control, y el texto se muestra seg\u00fan las especificaciones de los caracteres de control Unicode. Por lo tanto, un texto elaborado puede mostrar enlaces web enga\u00f1osos. Como resultado, se puede mostrar una URL falsificada y se pueden realizar ataques de phishing. Los productos y versiones afectados son los siguientes: KDDI +Message App para Android anterior a la versi\u00f3n 3.9.2 y +Message App para iOS anterior a la versi\u00f3n 3.9.4, NTT DOCOMO +Message App para Android anterior a la versi\u00f3n 54.49.0500 y +Message App para iOS anteriores a la versi\u00f3n 3.9.4 y SoftBank +Aplicaci\u00f3n de mensajes para Android anteriores a la versi\u00f3n 12.9.5 y Aplicaci\u00f3n +Message para iOS anteriores a la versi\u00f3n 3.9.4\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N\",\"baseScore\":5.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.5},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N\",\"baseScore\":5.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.5}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-116\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:docomo:\\\\+_message:*:*:*:*:*:iphone_os:*:*\",\"versionEndExcluding\":\"3.9.4\",\"matchCriteriaId\":\"CE90138C-C109-4CDE-8C65-5859A39EBB05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:docomo:\\\\+_message:*:*:*:*:*:android:*:*\",\"versionEndExcluding\":\"54.49.0500\",\"matchCriteriaId\":\"FA543127-2AE3-4AC8-B9A9-616D747BA9A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kddi:\\\\+_message:*:*:*:*:*:android:*:*\",\"versionEndExcluding\":\"3.9.2\",\"matchCriteriaId\":\"E841EC35-5A46-480C-98B5-EE8FCCBE6D51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kddi:\\\\+_message:*:*:*:*:*:iphone_os:*:*\",\"versionEndExcluding\":\"3.9.4\",\"matchCriteriaId\":\"F6F9AB9C-C30D-4AAA-B290-0A943F57AFFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:softbank:\\\\+_message:*:*:*:*:*:iphone_os:*:*\",\"versionEndExcluding\":\"3.9.4\",\"matchCriteriaId\":\"0F80D1CB-91BD-4235-AD63-24E97D1CFA2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:softbank:\\\\+_message:*:*:*:*:*:android:*:*\",\"versionEndExcluding\":\"12.9.5\",\"matchCriteriaId\":\"61823D93-B19D-491B-B920-13C456071B86\"}]}]}],\"references\":[{\"url\":\"https://jvn.jp/en/jp/JVN43561812/index.html\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.au.com/mobile/service/plus-message/information/\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.docomo.ne.jp/service/plus_message/\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.softbank.jp/mobile/service/plus-message/\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://jvn.jp/en/jp/JVN43561812/index.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.au.com/mobile/service/plus-message/information/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.docomo.ne.jp/service/plus_message/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.softbank.jp/mobile/service/plus-message/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.au.com/mobile/service/plus-message/information/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://www.docomo.ne.jp/service/plus_message/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://www.softbank.jp/mobile/service/plus-message/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://jvn.jp/en/jp/JVN43561812/index.html\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T13:32:59.662Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.4, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-43543\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-04-16T17:36:38.691998Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-116\", \"description\": \"CWE-116 Improper Encoding or Escaping of Output\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-04-16T17:36:35.523Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"KDDI CORPORATION, NTT DOCOMO, INC., and SoftBank Corp.\", \"product\": \"KDDI +Message App for Android and for iOS, NTT DOCOMO +Message App for Android and for iOS, and SoftBank +Message App for Android and for iOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"KDDI +Message App for Android prior to version 3.9.2 and +Message App for iOS prior to version 3.9.4, NTT DOCOMO +Message App for Android prior to version 54.49.0500 and +Message App for iOS prior to version 3.9.4, and SoftBank +Message App for Android prior to version 12.9.5 and +Message App for iOS prior to version 3.9.4\"}]}], \"references\": [{\"url\": \"https://www.au.com/mobile/service/plus-message/information/\"}, {\"url\": \"https://www.docomo.ne.jp/service/plus_message/\"}, {\"url\": \"https://www.softbank.jp/mobile/service/plus-message/\"}, {\"url\": \"https://jvn.jp/en/jp/JVN43561812/index.html\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"KDDI +Message App, NTT DOCOMO +Message App, and SoftBank +Message App contain a vulnerability caused by improper handling of Unicode control characters. +Message App displays text unprocessed, even when control characters are contained, and the text is shown based on Unicode control character\u0027s specifications. Therefore, a crafted text may display misleading web links. As a result, a spoofed URL may be displayed and phishing attacks may be conducted. Affected products and versions are as follows: KDDI +Message App for Android prior to version 3.9.2 and +Message App for iOS prior to version 3.9.4, NTT DOCOMO +Message App for Android prior to version 54.49.0500 and +Message App for iOS prior to version 3.9.4, and SoftBank +Message App for Android prior to version 12.9.5 and +Message App for iOS prior to version 3.9.4\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"User Interface (UI) Misrepresentation of Critical Information\"}]}], \"providerMetadata\": {\"orgId\": \"ede6fdc4-6654-4307-a26d-3331c018e2ce\", \"shortName\": \"jpcert\", \"dateUpdated\": \"2022-12-21T00:00:00.000Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2022-43543\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-04-16T17:36:43.679Z\", \"dateReserved\": \"2022-12-14T00:00:00.000Z\", \"assignerOrgId\": \"ede6fdc4-6654-4307-a26d-3331c018e2ce\", \"datePublished\": \"2022-12-21T00:00:00.000Z\", \"assignerShortName\": \"jpcert\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…