A vulnerability in the password reset workflow of the Touch Lebanon Mobile App 2.20.2 allows an attacker to bypass the OTP reset password mechanism. By manipulating the reset process, an unauthorized user may be able to reset the password and gain access to the account without needing to provide a legitimate authentication factor, such as an OTP. This compromises account security and allows for potential unauthorized access to user data.
Metrics
Affected Vendors & Products
References
History
Wed, 20 Aug 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-640 | |
Metrics |
cvssV3_1
|
Wed, 20 Aug 2025 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability in the password reset workflow of the Touch Lebanon Mobile App 2.20.2 allows an attacker to bypass the OTP reset password mechanism. By manipulating the reset process, an unauthorized user may be able to reset the password and gain access to the account without needing to provide a legitimate authentication factor, such as an OTP. This compromises account security and allows for potential unauthorized access to user data. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published: 2025-08-20T00:00:00.000Z
Updated: 2025-08-20T13:51:51.934Z
Reserved: 2025-06-16T00:00:00.000Z
Link: CVE-2025-50503

Updated: 2025-08-20T13:50:46.678Z

Status : Awaiting Analysis
Published: 2025-08-20T14:15:45.667
Modified: 2025-08-20T14:39:07.860
Link: CVE-2025-50503

No data.