Skip to main content

CVE-2023-43990: n/a in n/a

Medium
VulnerabilityCVE-2023-43990cvecve-2023-43990
Published: Wed Jan 24 2024 (01/24/2024, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: n/a

Description

An issue in cherub-hair mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.

AI-Powered Analysis

AILast updated: 07/08/2025, 19:25:46 UTC

Technical Analysis

CVE-2023-43990 is a medium-severity vulnerability identified in the cherub-hair mini-app component of the Line messaging application, specifically version 13.6.1. The vulnerability arises due to the leakage of the channel access token, which is a sensitive credential used to authenticate and authorize actions within the app's ecosystem. An attacker who successfully exploits this vulnerability can send crafted malicious notifications to users. These notifications could potentially be used for phishing, social engineering, or spreading misinformation by impersonating legitimate sources within the Line app. The CVSS 3.1 base score of 5.4 reflects that the attack vector is network-based (AV:N), requires low attack complexity (AC:L), and requires some privileges (PR:L) but no user interaction (UI:N). The impact affects confidentiality and integrity but not availability, indicating that while the attacker can manipulate notification content and potentially access some information, they cannot disrupt the service's availability. No known exploits in the wild have been reported, and no patches or vendor advisories are currently linked, which suggests that mitigation may rely on updates from the vendor or user-side precautions. The lack of detailed product and vendor information limits the ability to fully assess the scope, but the vulnerability is tied to a widely used messaging platform, which increases its potential reach.

Potential Impact

For European organizations, the impact of this vulnerability could be significant, especially for those relying on Line for internal or external communications, customer engagement, or marketing. Malicious notifications could lead to targeted phishing campaigns, resulting in credential theft, unauthorized access to corporate resources, or the spread of disinformation that undermines trust and operational integrity. Organizations in sectors such as finance, healthcare, and government could be particularly vulnerable due to the sensitivity of their communications and the potential regulatory implications of data breaches or misinformation. Additionally, the compromise of channel access tokens could allow attackers to impersonate legitimate communication channels, damaging brand reputation and causing financial loss. Given the network-based attack vector and the lack of required user interaction, the threat could propagate rapidly if exploited, increasing the risk of widespread impact within organizations that have integrated Line into their communication workflows.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize the following actions: 1) Monitor for updates and patches from Line or the mini-app developers and apply them promptly once available. 2) Restrict and monitor access to channel access tokens, ensuring they are stored securely and rotated regularly to minimize the risk of leakage. 3) Implement network-level controls to detect and block suspicious notification traffic that deviates from normal patterns. 4) Educate users about the risks of malicious notifications and encourage verification of unexpected or unusual messages, even if they appear to come from trusted sources. 5) Employ multi-factor authentication and additional verification steps for sensitive actions initiated via the Line app to reduce the impact of token compromise. 6) Conduct regular security assessments of any integrated mini-apps or third-party components within communication platforms to identify and remediate vulnerabilities proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2023-09-25T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6839c098182aa0cae2b3b6c9

Added to database: 5/30/2025, 2:28:40 PM

Last enriched: 7/8/2025, 7:25:46 PM

Last updated: 8/12/2025, 4:09:16 PM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats