VYPR
Low severity3.1NVD Advisory· Published Aug 2, 2017· Updated May 13, 2026

CVE-2016-7812

CVE-2016-7812

Description

The Bank of Tokyo-Mitsubishi UFJ, Ltd. App for Android ver5.3.1, ver5.2.2 and earlier allow a man-in-the-middle attacker to downgrade the communication between the app and the server from TLS v1.2 to SSL v3.0, which may result in the attacker to eavesdrop on an encrypted communication.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Bank of Tokyo-Mitsubishi UFJ Android app (<=5.3.1) allows MITM downgrade from TLS 1.2 to SSL 3.0, enabling eavesdropping via POODLE attack.

Vulnerability

The Bank of Tokyo-Mitsubishi UFJ, Ltd. App for Android versions 5.3.1, 5.2.2 and earlier attempts to communicate with the server via TLS v1.2. However, if the server responds indicating SSL v3.0, the app falls back to SSL v3.0, which is vulnerable to the POODLE attack (CWE-757). This vulnerability allows a man-in-the-middle attacker to downgrade the encryption protocol.[1]

Exploitation

An attacker with man-in-the-middle network position can exploit this vulnerability by intercepting the TLS handshake and responding with a signal to downgrade to SSL v3.0. Once the connection uses SSL v3.0, the attacker can leverage the POODLE attack to decrypt the encrypted communication. No authentication or user interaction is required beyond the app's normal operation.[1]

Impact

Successful exploitation allows the attacker to eavesdrop on encrypted communications between the app and the server. This could lead to disclosure of sensitive information such as account details or transaction data. The CVSS v3 base score is 3.1 (Low) with a confidentiality impact of Low and no integrity or availability impact.[1]

Mitigation

Users should update the app to the latest version provided by The Bank of Tokyo-Mitsubishi UFJ, Ltd. The vendor has released an update to address this issue. No other workarounds are documented.[1]

AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.