CVE-2021-36460
📋 TL;DR
VeryFitPro mobile app versions 3.2.8 and earlier hash passwords locally and transmit those hashes to authenticate with backend APIs. This allows attackers who intercept or obtain password hashes to impersonate users and take over accounts. All users of the affected app versions are vulnerable.
💻 Affected Systems
- VeryFitPro (com.veryfit2hr.second)
📦 What is this software?
Veryfitpro by Veryfitpro Project
Veryfitpro by Veryfitpro Project
⚠️ Risk & Real-World Impact
Worst Case
Complete account takeover for all users, allowing attackers to access personal data, modify account settings, and potentially access connected services.
Likely Case
Targeted account compromise for users whose network traffic is intercepted or whose hashes are otherwise obtained, leading to privacy violations and unauthorized access.
If Mitigated
Limited impact with proper network security controls and monitoring, though fundamental authentication flaws remain.
🎯 Exploit Status
Exploitation requires obtaining password hashes through network interception, database compromise, or other means.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None available
Restart Required: No
Instructions:
No official patch available. Users should uninstall the app until a fixed version is released.
🔧 Temporary Workarounds
Uninstall Vulnerable App
allRemove the VeryFitPro app from all devices to eliminate the vulnerability.
Network Traffic Monitoring
allMonitor for transmission of password hashes in network traffic and block suspicious authentication attempts.
🧯 If You Can't Patch
- Discontinue use of VeryFitPro app and migrate to alternative fitness tracking solutions.
- Implement strict network segmentation and monitoring for devices running the vulnerable app.
🔍 How to Verify
Check if Vulnerable:
Check app version in device settings. If version is 3.2.8 or earlier, the device is vulnerable.
Check Version:
Check app version in device app settings or app store listing.
Verify Fix Applied:
Verify app has been uninstalled or updated to a version later than 3.2.8 (if available).
📡 Detection & Monitoring
Log Indicators:
- Failed authentication attempts using intercepted hashes
- Unusual account access patterns
Network Indicators:
- Transmission of password hashes in authentication requests
- API calls using hash-based authentication
SIEM Query:
Search for authentication events containing hash values or unusual authentication patterns from VeryFitPro app.