CVE-2025-0590
Published: 20 January 2025
Summary
CVE-2025-0590 is a high-severity Incorrect Permission Assignment for Critical Resource (CWE-732) vulnerability in Tecno (inferred from references). Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Data from Local System (T1005); ranked at the 34.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-19 (Access Control for Mobile Devices) and AC-6 (Least Privilege).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates improper permission settings in mobile applications by establishing usage restrictions, configuration requirements, and access controls for mobile devices.
Addresses the vulnerability by establishing and documenting secure configuration settings, including proper permission configurations, for the affected mobile application.
Prevents information leakage risk by enforcing the principle of least privilege on permissions granted to the mobile application.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Improper permissions enable remote network-based data access (T1190) directly resulting in unauthorized sensitive data retrieval from the affected application/system (T1005).
NVD Description
Improper permission settings for mobile applications (com.transsion.carlcare) may lead to information leakage risk.
Deeper analysisAI
CVE-2025-0590 involves improper permission settings in the com.transsion.carlcare mobile application, which may lead to an information leakage risk. This vulnerability, published on 2025-01-20, is linked to CWE-732 and carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating high confidentiality impact with no effects on integrity or availability.
The vulnerability can be exploited by a remote, unauthenticated attacker over the network with low attack complexity and no user interaction required. Successful exploitation allows the attacker to access sensitive information stored or handled by the affected application, resulting in unauthorized data disclosure.
Mitigation details are available in advisories from the Tecno Security Response Center, including the specific blog post at https://security.tecno.com/SRC/blogdetail/381?lang=en_US and the security updates page at https://security.tecno.com/SRC/securityUpdates.
Details
- CWE(s)