Vulnerability Note VU#432608
IBM Notes Traveler for Android transmits user credentials over HTTP
Original Release date: 07 Nov 2014 | Last revised: 13 Nov 2014
The IBM Notes Traveler application for Android does not enforce the use of HTTPS for transmitting user credentials, which can allow an attacker to obtain this information.
IBM Notes Traveler (formerly known as Lotus Notes Traveler) is an application that allows access to email, calendar, and contacts from mobile devices and tablets.
CWE-319: Cleartext Transmission of Sensitive Information
IBM Notes Traveler prior to version 184.108.40.206 uses HTTP by default for transmitting login credentials.
An attacker with access to network traffic can obtain user credentials for IBM Notes.
Apply an update
This issue is addressed in version 220.127.116.11 of Notes Traveler for Android. This version will use HTTPS by default and will warn the user when HTTP is configured.
Vendor Information (Learn More)
VendorStatusDate NotifiedDate UpdatedIBM CorporationAffected18 Sep 201407 Nov 2014If you are a vendor and your product is affected, let
CVSS Metrics (Learn More)
This vulnerability was reported by Will Dormann of the CERT/CC.
This document was written by Will Dormann.
31 Oct 2014
Date First Published:
07 Nov 2014
Date Last Updated:
13 Nov 2014
FeedbackIf you have feedback, comments, or additional information about this vulnerability, please send us email.