CVE-2023-28647

Nextcloud iOS is an ios application used to interface with the nextcloud home cloud ecosystem. In versions prior to 4.7.0 when an attacker has physical access to an unlocked device, they may enable the integration into the iOS Files app and bypass the Nextcloud pin/password protection and gain access to a users files. It is recommended that the Nextcloud iOS app is upgraded to 4.7.0. There are no known workarounds for this vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:nextcloud:nextcloud:*:*:*:*:*:iphone_os:*:*

History

07 Apr 2023, 14:29

Type Values Removed Values Added
CWE CWE-287
CWE-281
NVD-CWE-noinfo
References (MISC) https://github.com/nextcloud/ios/pull/2344 - (MISC) https://github.com/nextcloud/ios/pull/2344 - Patch
References (MISC) https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wjgg-2v4p-2gq6 - (MISC) https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wjgg-2v4p-2gq6 - Vendor Advisory
CPE cpe:2.3:a:nextcloud:nextcloud:*:*:*:*:*:iphone_os:*:*
First Time Nextcloud nextcloud
Nextcloud
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.8

Information

Published : 2023-03-30 19:15

Updated : 2023-04-07 14:29


NVD link : CVE-2023-28647

Mitre link : CVE-2023-28647


JSON object : View

Products Affected

nextcloud

  • nextcloud