| [Japanese] | 
| JVNDB-2018-000047 | 
| IIJ SmartKey App for Android vulnerable to authentication bypass | 
|
| 
 
IIJ SmartKey App for Android contains an authentication bypass vulnerability.
 IIJ SmartKey App for Android provided by Internet Initiative Japan Inc. is an application that enables two-step authentication (two-factor authentication) for a website from an Android device. IIJ SmartKey App for Android contains an authentication bypass vulnerability (CWE-287).
 
 Ryo Tateguchi of AndroPlus reported this vulnerability to IPA.
 JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
 | 
|
| 
 
  CVSS V3 Severity:Base Metrics 3.3 (Low) [IPA Score]
 
    Attack Vector: LocalAttack Complexity: LowPrivileges Required: NoneUser Interaction: RequiredScope: UnchangedConfidentiality Impact: LowIntegrity Impact: NoneAvailability Impact: None 
  CVSS V2 Severity:Base Metrics 2.6 (Low) [IPA Score]
 
    Access Vector: NetworkAccess Complexity: HighAuthentication: NoneConfidentiality Impact: PartialIntegrity Impact: NoneAvailability Impact: None 
  
 | 
|
| 
 
	
 | 
| 
 
	Internet Initiative Japan Inc.
	
		IIJ SmartKey App for Android version 2.1.0 and earlier | 
| 
 
	
 | 
|
| 
 
An attacker may be able to obtain one-time password.
 | 
|
| 
 
[Update the Software]Update to the latest version according to the information provided by the developer.
 The developer recommends that users should update the application to 2.1.1 or later version immediately.
 
 [Apply a Workaround]
 The following workaround may mitigate the impact of this vulnerability.
 *Use the screen lock of Android OS standard function
 | 
|
| 
 
	Internet Initiative Japan Inc.
	
 | 
|
| 
 
	Improper Authentication(CWE-287) [IPA Evaluation] | 
|
| 
 
	CVE-2018-0584  | 
|
| 
 
	JVN : JVN#27137002 National Vulnerability Database (NVD) : CVE-2018-0584  | 
|
| 
 
	[2018/05/11]Web page was published
[2019/12/27]References : Contents were added
 
 |