Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-41986: Exposure of Sensitive Information to an Unauthorized Actor in Internet Initiative Japan Inc. IIJ SmartKey

0
High
VulnerabilityCVE-2022-41986cvecve-2022-41986
Published: Mon Oct 24 2022 (10/24/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Internet Initiative Japan Inc.
Product: IIJ SmartKey

Description

Information disclosure vulnerability in Android App 'IIJ SmartKey' versions prior to 2.1.4 allows an attacker to obtain a one-time password issued by the product under certain conditions.

AI-Powered Analysis

AILast updated: 07/05/2025, 12:42:40 UTC

Technical Analysis

CVE-2022-41986 is an information disclosure vulnerability found in the Android application 'IIJ SmartKey' developed by Internet Initiative Japan Inc. This vulnerability affects all versions prior to 2.1.4 of the app. The flaw allows an unauthorized attacker to obtain a one-time password (OTP) generated by the application under certain conditions, without requiring any user interaction or privileges. The vulnerability is remotely exploitable (Attack Vector: Network) with low attack complexity and no privileges or user interaction needed, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact is limited to confidentiality, specifically the exposure of sensitive OTPs, which are typically used for two-factor authentication or secure access. The integrity and availability of the system are not affected. The vulnerability was publicly disclosed on October 24, 2022, and has a CVSS v3.1 base score of 7.5, categorizing it as a high-severity issue. There are no known exploits in the wild reported so far. The vulnerability likely arises from improper handling or storage of OTP data within the app, allowing attackers to intercept or extract these codes remotely. Since OTPs are critical for secure authentication, their exposure can enable attackers to bypass multi-factor authentication protections and gain unauthorized access to user accounts or services protected by IIJ SmartKey.

Potential Impact

For European organizations, the exposure of OTPs through this vulnerability poses a significant risk to the confidentiality of authentication credentials. Organizations using IIJ SmartKey for securing access to corporate resources, VPNs, or cloud services could face unauthorized account takeovers if attackers exploit this flaw. This could lead to data breaches, unauthorized transactions, or lateral movement within networks. Although IIJ SmartKey is primarily a product from a Japanese vendor, European companies with business ties to Japan or those using this app for secure authentication could be impacted. The compromise of OTPs undermines multi-factor authentication, a critical security control, increasing the risk of fraud and data leakage. Additionally, sectors with high security requirements such as finance, government, and critical infrastructure in Europe could be particularly vulnerable if this app is in use. The lack of known exploits in the wild reduces immediate risk, but the high severity score and ease of exploitation mean that threat actors may develop exploits, increasing future risk.

Mitigation Recommendations

European organizations should immediately verify if IIJ SmartKey is deployed within their environment and identify the app versions in use. If versions prior to 2.1.4 are found, they must be upgraded to version 2.1.4 or later, which contains the patch for this vulnerability. Network monitoring should be enhanced to detect unusual access patterns or attempts to intercept OTPs. Organizations should consider temporarily disabling IIJ SmartKey-based authentication until the patch is applied or switch to alternative multi-factor authentication solutions with verified security. Additionally, enforcing strict app permissions and isolating authentication apps from other network traffic can reduce exposure. User education is important to recognize suspicious activity or unexpected OTP requests. Finally, integrating anomaly detection systems to flag unusual authentication attempts can help mitigate exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
jpcert
Date Reserved
2022-10-07T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981ac4522896dcbd95f7

Added to database: 5/21/2025, 9:08:42 AM

Last enriched: 7/5/2025, 12:42:40 PM

Last updated: 2/7/2026, 8:22:03 PM

Views: 41

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats