Insecure AES Encryption in Procter & Gamble Oral-B App for Android

Insecure AES Encryption in Procter & Gamble Oral-B App for Android

CVE-2018-5298 · MEDIUM Severity

AV:N/AC:L/AU:N/C:P/I:N/A:N

In the Procter & Gamble "Oral-B App" (aka com.pg.oralb.oralbapp) application 5.0.0 for Android, AES encryption with static parameters is used to secure the locally stored shared preferences. An attacker can gain access to locally stored user data more easily by leveraging access to the preferences XML file.

Learn more about our Cis Benchmark Audit For Google Android.