Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-5554: na in LINE Corporation LINE client for iOS

0
Medium
VulnerabilityCVE-2023-5554cvecve-2023-5554
Published: Thu Oct 12 2023 (10/12/2023, 09:34:01 UTC)
Source: CVE Database V5
Vendor/Project: LINE Corporation
Product: LINE client for iOS

Description

Lack of TLS certificate verification in log transmission of a financial module within LINE client for iOS prior to 13.16.0.

AI-Powered Analysis

AILast updated: 12/09/2025, 08:00:26 UTC

Technical Analysis

CVE-2023-5554 is a vulnerability identified in the LINE client for iOS, specifically affecting version 13.12.0 and earlier versions prior to 13.16.0. The issue arises from a lack of proper TLS certificate verification during the transmission of logs within a financial module of the application. TLS certificate verification is a critical security control that ensures the authenticity of the server to which the client is connecting, preventing man-in-the-middle (MitM) attacks. Without this verification, an attacker positioned on the network path could intercept or modify the transmitted log data, potentially exposing sensitive financial information or injecting malicious data. The vulnerability has a CVSS v3.1 base score of 4.8, categorized as medium severity, reflecting limited confidentiality and integrity impacts, no availability impact, and requiring no privileges or user interaction but with high attack complexity. No known exploits have been reported in the wild, suggesting limited active exploitation. The vulnerability is specific to the iOS platform and the LINE client’s financial module, which may be used for sensitive transactions or communications. The absence of patch links in the provided data suggests that users should verify and update to the latest LINE client version (13.16.0 or later) where this issue is resolved. This vulnerability highlights the importance of robust TLS implementation in mobile financial applications to protect user data against interception and tampering.

Potential Impact

For European organizations, especially those relying on LINE for financial communications or customer interactions, this vulnerability poses a risk of sensitive data exposure through network interception. Although the impact is limited to confidentiality and integrity without affecting availability, financial data leakage or manipulation could lead to financial fraud, reputational damage, and regulatory non-compliance under GDPR. Organizations with employees or customers using the vulnerable LINE iOS client version may face targeted attacks exploiting this weakness, particularly in environments with untrusted or public Wi-Fi networks. The medium severity indicates that while the risk is not critical, it is significant enough to warrant prompt remediation to prevent potential data breaches. Financial institutions, fintech companies, and enterprises with mobile workforce in Europe could be particularly impacted if LINE is part of their communication tools. The lack of known exploits reduces immediate risk but does not eliminate the threat, as attackers could develop exploits given the vulnerability details.

Mitigation Recommendations

1. Immediately update the LINE client for iOS to version 13.16.0 or later where the TLS certificate verification issue is fixed. 2. Enforce organizational policies to restrict the use of outdated LINE client versions on corporate devices, especially those handling financial data. 3. Monitor network traffic for unusual patterns or signs of man-in-the-middle attacks, particularly on public or unsecured Wi-Fi networks. 4. Educate users about the risks of using unsecured networks and encourage the use of VPNs when accessing sensitive applications. 5. Implement mobile device management (MDM) solutions to enforce app updates and security configurations. 6. Conduct regular security assessments of mobile applications used within the organization to detect similar TLS or cryptographic weaknesses. 7. Coordinate with LINE Corporation for official patches and security advisories to stay informed about further developments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
LINE
Date Reserved
2023-10-12T09:17:12.045Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6937d385964788758a7fe756

Added to database: 12/9/2025, 7:45:09 AM

Last enriched: 12/9/2025, 8:00:26 AM

Last updated: 12/10/2025, 4:38:58 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats