VYPR

Easy

by Itrack

CVEs (5)

  • CVE-2016-6542Jul 13, 2018
    risk 0.00cvss epss 0.00

    The iTrack device tracking ID number, also called "LosserID" in the web API, can be obtained by being in the range of an iTrack device. The tracker ID is the device's BLE MAC address.

  • CVE-2016-6543Jul 13, 2018
    risk 0.00cvss epss 0.01

    A captured MAC/device ID of an iTrack Easy can be registered under multiple user accounts allowing access to getgps GPS data, which can allow unauthenticated parties to track the device.

  • CVE-2016-6545Jul 13, 2018
    risk 0.00cvss epss 0.01

    Session cookies are not used for maintaining valid sessions in iTrack Easy. The user's password is passed as a POST parameter over HTTPS using a base64 encoded passwd field on every request. In this implementation, sessions can only be terminated when the user changes the associated password.

  • CVE-2016-6544Jul 13, 2018
    risk 0.00cvss epss 0.01

    getgps data in iTrack Easy can be modified without authentication by setting the data using the parametercmd:setothergps. This vulnerability can be exploited to alter the GPS data of a lost device.

  • CVE-2016-6546Jul 13, 2018
    risk 0.00cvss epss 0.00

    The iTrack Easy mobile application stores the account password used to authenticate to the cloud API in base64-encoding in the cache.db file. The base64 encoding format is considered equivalent to cleartext.