Hardcoded AES Parameters in net.MCrypt Android App Vulnerability

Hardcoded AES Parameters in net.MCrypt Android App Vulnerability

CVE-2017-15582 · MEDIUM Severity

AV:N/AC:L/AU:N/C:P/I:N/A:N

In net.MCrypt in the "Diary with lock" (aka WriteDiary) application 4.72 for Android, hardcoded SecretKey and iv variables are used for the AES parameters, which makes it easier for attackers to obtain the cleartext of stored diary entries.

Learn more about our Cis Benchmark Audit For Google Android.