Critical severity9.8NVD Advisory· Published Oct 29, 2017· Updated May 13, 2026
CVE-2017-15999
CVE-2017-15999
Description
In the "NQ Contacts Backup & Restore" application 1.1 for Android, no HTTPS is used for transmitting login and synced user data. When logging in, the username is transmitted in cleartext along with an SHA-1 hash of the password. The attacker can either crack this hash or use it for further attacks where only the hash value is required.
Affected products
1- cpe:2.3:a:nq:contacts_backup_\&_restore:1.1:*:*:*:*:android:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- 1337sec.blogspot.de/2017/10/auditing-nq-contacts-backup-restore-11.htmlnvdThird Party Advisory
News mentions
0No linked articles in our index yet.