Vulnerabilities > Health > Covidsafe

DATE CVE VULNERABILITY TITLE RISK
2020-09-09 CVE-2020-14292 Unspecified vulnerability in Health Covidsafe
In the COVIDSafe application through 1.0.21 for Android, unsafe use of the Bluetooth transport option in the GATT connection allows attackers to trick the application into establishing a connection over Bluetooth BR/EDR transport, which reveals the public Bluetooth address of the victim's phone without authorisation, bypassing the Bluetooth address randomisation protection in the user's phone.
low complexity
health
5.7
2020-05-18 CVE-2020-12860 Improper Privilege Management vulnerability in Health Covidsafe 1.0.11/1.0.16
COVIDSafe through v1.0.17 allows a remote attacker to access phone name and model information because a BLE device can have four roles and COVIDSafe uses all of them.
network
low complexity
health CWE-269
5.3
2020-05-18 CVE-2020-12859 Cleartext Storage of Sensitive Information vulnerability in Health Covidsafe 1.0.11/1.0.16
Unnecessary fields in the OpenTrace/BlueTrace protocol in COVIDSafe through v1.0.17 allow a remote attacker to identify a device model by observing cleartext payload data.
network
low complexity
health CWE-312
5.3
2020-05-18 CVE-2020-12858 Use of Insufficiently Random Values vulnerability in Health Covidsafe 1.0.11/1.0.16
Non-reinitialisation of random data in the advertising payload in COVIDSafe v1.0.15 and v1.0.16 allows a remote attacker to re-identify Android devices running COVIDSafe by scanning for their advertising beacons.
network
low complexity
health CWE-330
7.5
2020-05-18 CVE-2020-12857 Incomplete Cleanup vulnerability in Health Covidsafe 1.0.11/1.0.16
Caching of GATT characteristic values (TempID) in COVIDSafe v1.0.15 and v1.0.16 allows a remote attacker to long-term re-identify an Android device running COVIDSafe.
network
low complexity
health CWE-459
7.5
2020-05-18 CVE-2020-12856 OpenTrace, as used in COVIDSafe through v1.0.17, TraceTogether, ABTraceTogether, and other applications on iOS and Android, allows remote attackers to conduct long-term re-identification attacks and possibly have unspecified other impact, because of how Bluetooth is used.
network
low complexity
alberta tracetogether health
critical
9.8
2020-05-14 CVE-2020-12717 The COVIDSafe (Australia) app 1.0 and 1.1 for iOS allows a remote attacker to crash the app, and consequently interfere with COVID-19 contact tracing, via a Bluetooth advertisement containing manufacturer data that is too short.
low complexity
alberta tracetogether health gov
6.5