FKIE_CVE-2024-12604
Vulnerability from fkie_nvd - Published: 2025-03-10 15:15 - Updated: 2025-09-12 08:15
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Summary
Cleartext Storage of Sensitive Information in an Environment Variable, Weak Password Recovery Mechanism for Forgotten Password vulnerability in Tapandsign Technologies Tap&Sign App allows Password Recovery Exploitation, Functionality Misuse.This issue affects Tap&Sign App: before V.1.025.
References
| URL | Tags | ||
|---|---|---|---|
| iletisim@usom.gov.tr | https://docs.tapandsign.com/tap-and-sign/tap-and-sign-v.1.025-surum-notlari | Release Notes | |
| iletisim@usom.gov.tr | https://www.usom.gov.tr/bildirim/tr-25-0063 | Third Party Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| tapandsign | tap\&sign | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tapandsign:tap\\\u0026sign:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7E38B9DF-2BC7-40C1-A07F-77CEE465DF41",
"versionEndExcluding": "1.025",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [
{
"sourceIdentifier": "iletisim@usom.gov.tr",
"tags": [
"exclusively-hosted-service"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Cleartext Storage of Sensitive Information in an Environment Variable, Weak Password Recovery Mechanism for Forgotten Password vulnerability in Tapandsign Technologies Tap\u0026Sign App allows Password Recovery Exploitation, Functionality Misuse.This issue affects Tap\u0026Sign App: before V.1.025."
},
{
"lang": "es",
"value": "Almacenamiento de texto plano de informaci\u00f3n confidencial en una variable de entorno, mecanismo de recuperaci\u00f3n de contrase\u00f1a d\u00e9bil para vulnerabilidad de contrase\u00f1a olvidada en Tapandsign Technologies Tap\u0026amp;Sign App permite la explotaci\u00f3n de la recuperaci\u00f3n de contrase\u00f1a y el uso indebido de la funcionalidad. Este problema afecta a la aplicaci\u00f3n Tap\u0026amp;Sign: antes de V.1.025."
}
],
"id": "CVE-2024-12604",
"lastModified": "2025-09-12T08:15:44.320",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5,
"source": "iletisim@usom.gov.tr",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5,
"source": "nvd@nist.gov",
"type": "Secondary"
}
]
},
"published": "2025-03-10T15:15:36.947",
"references": [
{
"source": "iletisim@usom.gov.tr",
"tags": [
"Release Notes"
],
"url": "https://docs.tapandsign.com/tap-and-sign/tap-and-sign-v.1.025-surum-notlari"
},
{
"source": "iletisim@usom.gov.tr",
"tags": [
"Third Party Advisory"
],
"url": "https://www.usom.gov.tr/bildirim/tr-25-0063"
}
],
"sourceIdentifier": "iletisim@usom.gov.tr",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-526"
},
{
"lang": "en",
"value": "CWE-640"
}
],
"source": "iletisim@usom.gov.tr",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-312"
},
{
"lang": "en",
"value": "CWE-640"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…