Vulnerability Note VU#704916

The TigerText Free Consumer Private Texting App (iOS) sends unencrypted user information in support requests

Original Release date: 02 Apr 2013 | Last revised: 02 Apr 2013


The TigerText Free Consumer Private Texting App (iOS) sends unencrypted user information to TigerText support.


The TigerText app generates an unencrypted log file containing the TigerText username and password on the device when a user taps on "Contact Customer Support." An email is generated to support that sends the log information with it. This does not impact the TigerText Pro application.


TigerText usernames and passwords may be viewable by TigerText support or others with access to the device or email. A recipient of the email containing the log file could use credentials to impersonate the user, gaining unauthorized access to any non-expired messages.


Apply an Update

An updated app is available from the iTunes App Store. Version 3.1.402 or above contains a patch that removes sensitive information from the log file. The latest version is available here:

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
TigerTextAffected07 Feb 201318 Mar 2013
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base 1.7 AV:L/AC:L/Au:S/C:P/I:N/A:N
Temporal 1.4 E:F/RL:OF/RC:C
Environmental 0.4 CDP:N/TD:L/CR:ND/IR:ND/AR:ND



Thanks to Pedro Paixao for reporting this vulnerability.

This document was written by Chris King.

Other Information

  • CVE IDs: CVE-2013-0128
  • Date Public: 02 Apr 2013
  • Date First Published: 02 Apr 2013
  • Date Last Updated: 02 Apr 2013
  • Document Revision: 16


If you have feedback, comments, or additional information about this vulnerability, please send us email.