CVE-2024-35537

TVS Motor Company Limited TVS Connect Android v4.6.0 and IOS v5.0.0 was discovered to insecurely handle the RSA key pair, allowing attackers to possibly access sensitive information via decryption.
References
Link Resource
https://github.com/aaravavi/TVS-Connect-Application-VAPT Exploit Third Party Advisory
https://github.com/aaravavi/TVS-Connect-Application-VAPT Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:tvsmotor:tvs_connect:5.0.0:*:*:*:*:iphone_os:*:*
cpe:2.3:a:tvsmotor:tvs_connect:4.6.0:*:*:*:*:android:*:*

History

24 Jun 2024, 19:40

Type Values Removed Values Added
References () https://github.com/aaravavi/TVS-Connect-Application-VAPTĀ - () https://github.com/aaravavi/TVS-Connect-Application-VAPTĀ - Exploit, Third Party Advisory
First Time Tvsmotor
Tvsmotor tvs Connect
CPE cpe:2.3:a:tvsmotor:tvs_connect:5.0.0:*:*:*:*:iphone_os:*:*
cpe:2.3:a:tvsmotor:tvs_connect:4.6.0:*:*:*:*:android:*:*
CWE CWE-327
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5

21 Jun 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-21 17:15

Updated : 2025-03-13 15:15


NVD link : CVE-2024-35537

Mitre link : CVE-2024-35537


JSON object : View

Products Affected

tvsmotor

  • tvs_connect
CWE
CWE-327

Use of a Broken or Risky Cryptographic Algorithm