CVE-2025-25758
Published: 20 March 2025
Summary
CVE-2025-25758 is a high-severity Cleartext Storage of Sensitive Information (CWE-312) vulnerability in Kukufm Kukufm. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Data from Local System (T1005); ranked at the 31.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 AC-19 (Access Control for Mobile Devices) and CM-6 (Configuration Settings).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Enforces secure configuration settings such as setting android:allowBackup="false" in AndroidManifest.xml to prevent unauthorized backup extraction of sensitive data.
Implements cryptographic protection for sensitive information at rest, ensuring data remains confidential even if accessed via enabled Android backup functionality.
Establishes usage restrictions and access controls for mobile devices, including disabling unnecessary backup features and encrypting sensitive app data.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability's allowBackup=true setting combined with cleartext storage of sensitive data directly enables extraction of application data from local storage via Android backup, facilitating T1005 Data from Local System for collection of sensitive information.
NVD Description
An issue in KukuFM Android v1.12.7 (11207) allows attackers to access sensitive cleartext data via the android:allowBackup="true" in the ANdroidManifest.xml
Deeper analysisAI
CVE-2025-25758, published on 2025-03-20, affects the KukuFM Android application version 1.12.7 (build 11207). The vulnerability arises from the android:allowBackup="true" attribute in the AndroidManifest.xml file, which enables attackers to access sensitive data stored in cleartext. It is classified under CWE-312 (Cleartext Storage of Sensitive Information) with a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating high severity due to significant confidentiality impact.
Any network-accessible attacker can exploit this issue without authentication, privileges, or user interaction. By leveraging Android's backup functionality, they can extract and access the application's sensitive cleartext data, potentially exposing user information or other confidential content stored locally.
Advisories and additional details are referenced at https://pastebin.com/0cb0KsGS.
Details
- CWE(s)