We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
According to the researcher: "The TLS connections are encrypted against tampering or eavesdropping. However, the application does not validate the server certificate properly while initializing the TLS connection. This allows for a network attacker to intercept the connection and read the data. The attacker could the either send the client a malicious response, or forward the (possibly modified) data to the real server."
Reserved 2024-08-19 | Published 2024-10-02 | Updated 2024-10-02 | Assigner Google_DevicesCWE-269 Improper Privilege Management
support.google.com/...r/14950962?sjid=9489879942601373169-NA
Support options