A vulnerability in the password reset workflow of the Touch Lebanon Mobile App 2.20.2 allows an attacker to bypass the OTP reset password mechanism. By manipulating the reset process, an unauthorized user may be able to reset the password and gain access to the account without needing to provide a legitimate authentication factor, such as an OTP. This compromises account security and allows for potential unauthorized access to user data.
History

Wed, 20 Aug 2025 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-640
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 20 Aug 2025 13:30:00 +0000

Type Values Removed Values Added
Description A vulnerability in the password reset workflow of the Touch Lebanon Mobile App 2.20.2 allows an attacker to bypass the OTP reset password mechanism. By manipulating the reset process, an unauthorized user may be able to reset the password and gain access to the account without needing to provide a legitimate authentication factor, such as an OTP. This compromises account security and allows for potential unauthorized access to user data.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-08-20T00:00:00.000Z

Updated: 2025-08-20T13:51:51.934Z

Reserved: 2025-06-16T00:00:00.000Z

Link: CVE-2025-50503

cve-icon Vulnrichment

Updated: 2025-08-20T13:50:46.678Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-20T14:15:45.667

Modified: 2025-08-20T14:39:07.860

Link: CVE-2025-50503

cve-icon Redhat

No data.