6.5
CVSSv3

CVE-2020-12717

Published: 14/05/2020 Updated: 07/11/2023
CVSS v2 Base Score: 3.3 | Impact Score: 2.9 | Exploitability Score: 6.5
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 295
Vector: AV:A/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The COVIDSafe (Australia) app 1.0 and 1.1 for iOS allows a remote malicious user to crash the app, and consequently interfere with COVID-19 contact tracing, via a Bluetooth advertisement containing manufacturer data that is too short. This occurs because of an erroneous OpenTrace manuData.subdata call. The ABTraceTogether (Alberta), ProteGO (Poland), and TraceTogether (Singapore) apps were also affected.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

alberta abtracetogether -

tracetogether tracetogether -

health covidsafe 1.0

health covidsafe 1.1

gov protego safe -

Github Repositories

Code for exploit for CVE-2020-12717

What This is the code for the demonstration of the COVIDSafe exploit in See mediumcom/@wabz/covidsafe-ios-vulnerability-cve-2020-12717-30dc003f9708 for more information Server This has to be run on linux It uses @abandonware/bleno nodejs module (you need nodejs10), which trivially allows setting advertising bytes for the gatt server I run this on Linux Mint, in Virt

Recent public work COVIDSafe May 2020: Dissection of binary iOS app showing derived broken background behaviour on iOS from OpenTrace May 2020: Published CVE-2020-12717 - remote crash bug on iOS June 2020: Published further broken background behaviour on iOS caused by keychain items having access only on AccessibleWhenUnlocked July 2020: Reported bug iOS app prevents new conne