It is possible to send mass messages to the phones numbers and emails of the victims, causing saturation of the inbox and consuming resources of the user.
- Flood the inbox of the victim.
- Increase abruptly the consumed resources of the device.
- Hide important information from other messages.
- Facilitate other attacks like phishing.
Restrict the consecutive sending of messages through mechanisms such as time delays or controls over the amount of messages sent
External attacker with access to the code.
Expected Remediation Time
Default score using CVSS 3.1. It may change depending on the context of the src.
- Attack vector: N
- Attack complexity: L
- Privileges required: N
- User interaction: N
- Scope: U
- Confidentiality: N
- Integrity: L
- Availability: N
- Exploit code madurity: X
- Remediation level: X
- Report confidence: X
- Vector string: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:X/RL:X/RC:X
- Base: 5.3
- Temporal: 5.3
- Base: Medium
- Temporal: Medium
Search for vulnerabilities in your apps for free with our automated security testing! Start your 21-day free trial and discover the benefits of our Continuous Hacking Machine Plan. If you prefer a full service that includes the expertise of our ethical hackers, don't hesitate to contact us for our Continuous Hacking Squad Plan.