Published:2024/11/20 Last Updated:2024/11/20
JVN#16114985
"Kura Sushi Official App Produced by EPARK" for Android uses a hard-coded cryptographic key
Overview
"Kura Sushi Official App Produced by EPARK" for Android provided by EPARK, Inc. uses a hard-coded cryptographic key.
Products Affected
- "Kura Sushi Official App Produced by EPARK" for Android versions prior to 3.8.5
Description
"Kura Sushi Official App Produced by EPARK" for Android provided by EPARK, Inc. uses a hard-coded cryptographic key (CWE-321).
Impact
An attacker may obtain the login ID and password for the affected product.
Solution
Update the application
Update the application to the latest version according to the information provided by the developer.
The developer released the following version that contains a fix for this vulnerability.
- "Kura Sushi Official App Produced by EPARK" for Android version 3.8.5
Vendor Status
Vendor | Link |
EPARK, Inc. | Kura Sushi Official App Produced by EPARK (Text in Japanese) |
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
CVSS v3
CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Base Score:
4.0
Attack Vector(AV) | Physical (P) | Local (L) | Adjacent (A) | Network (N) |
---|---|---|---|---|
Attack Complexity(AC) | High (H) | Low (L) | ||
Privileges Required(PR) | High (H) | Low (L) | None (N) | |
User Interaction(UI) | Required (R) | None (N) | ||
Scope(S) | Unchanged (U) | Changed (C) | ||
Confidentiality Impact(C) | None (N) | Low (L) | High (H) | |
Integrity Impact(I) | None (N) | Low (L) | High (H) | |
Availability Impact(A) | None (N) | Low (L) | High (H) |
Credit
Nishimura Reiji of LAC Co., Ltd. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
Other Information
JPCERT Alert |
|
JPCERT Reports |
|
CERT Advisory |
|
CPNI Advisory |
|
TRnotes |
|
CVE |
CVE-2024-52614 |
JVN iPedia |
JVNDB-2024-000120 |