Published:2024/11/20  Last Updated:2024/11/20

JVN#16114985
"Kura Sushi Official App Produced by EPARK" for Android uses a hard-coded cryptographic key

Overview

"Kura Sushi Official App Produced by EPARK" for Android provided by EPARK, Inc. uses a hard-coded cryptographic key.

Products Affected

  • "Kura Sushi Official App Produced by EPARK" for Android versions prior to 3.8.5

Description

"Kura Sushi Official App Produced by EPARK" for Android provided by EPARK, Inc. uses a hard-coded cryptographic key (CWE-321).

Impact

An attacker may obtain the login ID and password for the affected product.

Solution

Update the application
Update the application to the latest version according to the information provided by the developer.
The developer released the following version that contains a fix for this vulnerability.

  • "Kura Sushi Official App Produced by EPARK" for Android version 3.8.5

Vendor Status

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

CVSS v3 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Base Score: 4.0
Attack Vector(AV) Physical (P) Local (L) Adjacent (A) Network (N)
Attack Complexity(AC) High (H) Low (L)
Privileges Required(PR) High (H) Low (L) None (N)
User Interaction(UI) Required (R) None (N)
Scope(S) Unchanged (U) Changed (C)
Confidentiality Impact(C) None (N) Low (L) High (H)
Integrity Impact(I) None (N) Low (L) High (H)
Availability Impact(A) None (N) Low (L) High (H)

Credit

Nishimura Reiji of LAC Co., Ltd. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2024-52614
JVN iPedia JVNDB-2024-000120