CVE-2025-1298
Published: 14 February 2025
Summary
CVE-2025-1298 is a critical-severity Authentication Bypass by Spoofing (CWE-290) vulnerability in Tecno (inferred from references). Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 39.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Remediates the specific logic vulnerability in the Carlcare mobile application through timely patching, directly preventing remote account takeover exploits.
Establishes usage restrictions, monitoring, and vulnerability scanning for mobile devices and apps like Carlcare to mitigate account takeover risks from logic flaws.
Limits actions allowable without identification or authentication, countering the no-privilege network exploitation vector that enables account takeover in this CVE.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote unauthenticated logic flaw (CWE-290) directly enables network-based exploitation of the app's authentication process for full account takeover, mapping to public-facing app exploitation and cloud/valid account abuse.
NVD Description
Logic vulnerability in the mobile application (com.transsion.carlcare) may lead to the risk of account takeover.
Deeper analysisAI
CVE-2025-1298 is a logic vulnerability, classified under CWE-290, in the mobile application com.transsion.carlcare that may lead to the risk of account takeover. The vulnerability affects the Carlcare app, associated with Transsion devices such as those from TECNO, and carries a critical CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). It was published on 2025-02-14T08:15:30.877.
Remote attackers can exploit this vulnerability over the network with low attack complexity, requiring no privileges, authentication, or user interaction. Successful exploitation enables high-impact compromise of confidentiality, integrity, and availability, potentially resulting in full account takeover for affected users.
Security practitioners should consult the vendor advisories for mitigation guidance and patch information, available at https://security.tecno.com/SRC/blogdetail/383?lang=en_US and https://security.tecno.com/SRC/securityUpdates.
Details
- CWE(s)