CVE-2026-4243
LOW
2,0
Source: [email protected]
Attack Vector: local
Attack Complexity: high
Privileges Required: low
User Interaction: none
Confidentiality: N/A
Integrity: N/A
Availability: N/A
LOW
2,5
Source: [email protected]
Attack Vector: local
Attack Complexity: high
Privileges Required: low
User Interaction: none
Scope: unchanged
Confidentiality: low
Integrity: none
Availability: none
LOW
1,0
Source: [email protected]
Access Vector: local
Access Complexity: high
Authentication: single
Confidentiality: partial
Integrity: none
Availability: none
Description
AI Translation Available
A weakness has been identified in La Nacion App 10.2.25 on Android. This impacts an unknown function of the file source/app/lanacion/clublanacion/BuildConfig.java of the component app.lanacion.activity. Executing a manipulation of the argument API_KEY_WEBSOCKET_CV can lead to unprotected storage of credentials. The attack can only be executed locally. A high complexity level is associated with this attack. The exploitability is said to be difficult. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
256
Plaintext Storage of a Password
IncompleteCommon Consequences
Security Scopes Affected:
Access Control
Potential Impacts:
Gain Privileges Or Assume Identity
Applicable Platforms
Technologies:
ICS/OT
https://vuldb.com/?ctiid.351185
https://vuldb.com/?id.351185
https://vuldb.com/?submit.771432
https://www.notion.so/WebSocket-Credential-Leak-Leading-to-Potential-DDoS-Attac…