Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://jvn.jp/en/jp/JVN24167657/ |
|
Thu, 14 May 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Kddi Corporation
Kddi Corporation あんしんフィルター For Au |
|
| Vendors & Products |
Kddi Corporation
Kddi Corporation あんしんフィルター For Au |
Thu, 14 May 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 14 May 2026 01:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Cleartext Transmission Vulnerability in KDDI ‘あんしんフィルター for au’ App |
Wed, 13 May 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Android App "あんしんフィルター for au" provided by KDDI CORPORATION contains Cleartext Transmission of Sensitive Information (CWE-319) vulnerability. A man-in-the-middle attacker may access and modify communications transmitted in plaintext, potentially resulting in information disclosure or data tampering. | |
| Weaknesses | CWE-319 | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: jpcert
Published:
Updated: 2026-05-14T13:54:45.871Z
Reserved: 2026-04-20T04:42:05.522Z
Link: CVE-2026-41281
Updated: 2026-05-14T13:54:42.668Z
Status : Deferred
Published: 2026-05-14T00:16:35.237
Modified: 2026-05-14T16:49:18.583
Link: CVE-2026-41281
No data.
OpenCVE Enrichment
Updated: 2026-05-14T14:33:03Z