Nextcloud android is an android app for interfacing with the nextcloud home server ecosystem. In versions from 3.7.0 and before 3.24.1 an attacker that has access to the unlocked physical device can bypass the Nextcloud Android Pin/passcode protection via a thirdparty app. This allows to see meta information like sharer, sharees and activity of files. It is recommended that the Nextcloud Android app is upgraded to 3.24.1. There are no known workarounds for this vulnerability.
Metrics
Affected Vendors & Products
References
History
Tue, 11 Feb 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-02-11T18:56:24.113Z
Reserved: 2023-03-20T12:19:47.209Z
Link: CVE-2023-28646

Updated: 2024-08-02T13:43:23.558Z

Status : Modified
Published: 2023-03-30T19:15:06.767
Modified: 2024-11-21T07:55:43.973
Link: CVE-2023-28646

No data.