{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T07:39:22.747","vulnerabilities":[{"cve":{"id":"CVE-2025-27606","sourceIdentifier":"security-advisories@github.com","published":"2025-03-14T17:15:52.017","lastModified":"2025-10-16T19:23:44.177","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Element Android is an Android Matrix Client provided by Element. Element Android up to version 1.6.32 can, under certain circumstances, fail to logout the user if they input the wrong PIN more than the configured amount of times. An attacker with physical access to a device can exploit this to guess the PIN. Version 1.6.34 solves the issue."},{"lang":"es","value":"Element Android es un cliente Android Matrix proporcionado por Element. Hasta la versión 1.6.32, Element Android puede, en ciertas circunstancias, no cerrar la sesión del usuario si este introduce el PIN incorrecto más veces de las configuradas. Un atacante con acceso físico al dispositivo puede aprovechar esta situación para averiguar el PIN. La versión 1.6.34 soluciona este problema."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N","baseScore":5.1,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.5,"impactScore":2.5},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":4.6,"baseSeverity":"MEDIUM","attackVector":"PHYSICAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":0.9,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-488"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:element:element:*:*:*:*:*:android:*:*","versionEndExcluding":"1.6.34","matchCriteriaId":"A8B8EB39-452C-4241-B996-9CF8EA0AEC4C"}]}]}],"references":[{"url":"https://github.com/element-hq/element-android/commit/53bd78b05de375c6e6b0b5aa794a56b4ba95984c","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/element-hq/element-android/commit/87d7fcdc8036a4db4da8c403f87c73a64a546304","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/element-hq/element-android/security/advisories/GHSA-632v-9pm3-m8ch","source":"security-advisories@github.com","tags":["Vendor Advisory"]}]}}]}