CVE-2021-44470: information disclosure in Intel(R) Connect M Android application
Incorrect default permissions for the Intel(R) Connect M Android application before version 1.7.4 may allow an authenticated user to potentially enable information disclosure via local access.
AI Analysis
Technical Summary
CVE-2021-44470 is a medium-severity vulnerability affecting the Intel(R) Connect M Android application versions prior to 1.7.4. The root cause of this vulnerability is incorrect default permissions set within the application, which may allow an authenticated local user to disclose sensitive information. Specifically, the flaw relates to improper access control (CWE-276), where the application does not adequately restrict access to certain data or resources. An attacker with legitimate access to the device and the application could exploit this vulnerability to gain unauthorized access to confidential information stored or processed by the app. The vulnerability does not require user interaction beyond authentication, and it is exploitable only with local access (AV:L), meaning the attacker must have physical or logical access to the device. The CVSS 3.1 base score is 5.5, reflecting a medium severity level, with a high impact on confidentiality but no impact on integrity or availability. No known exploits are currently reported in the wild, and no patches or updates are explicitly linked in the provided data, though upgrading to version 1.7.4 or later is implied to remediate the issue.
Potential Impact
For European organizations, the impact of this vulnerability depends largely on the deployment of the Intel Connect M Android application within their environments. Organizations using this app on employee or operational devices risk unauthorized disclosure of sensitive information if an attacker gains authenticated local access to these devices. This could lead to leakage of confidential corporate data, potentially including intellectual property, user credentials, or other sensitive operational details. The risk is heightened in environments where devices are shared, lost, or stolen, or where insider threats exist. Although the vulnerability does not allow remote exploitation, the local access requirement means that physical security and endpoint management are critical. In sectors with strict data protection regulations such as GDPR, unauthorized information disclosure could result in compliance violations and reputational damage. The medium severity suggests that while the threat is not critical, it should not be ignored, especially in high-security or regulated environments.
Mitigation Recommendations
European organizations should ensure that all instances of the Intel Connect M Android application are updated to version 1.7.4 or later, where this vulnerability is addressed. Since no direct patch links are provided, organizations should verify updates through official Intel or trusted app distribution channels. Additionally, organizations should enforce strict device access controls, including strong authentication mechanisms and device encryption, to mitigate the risk of unauthorized local access. Endpoint management solutions should be employed to monitor and restrict application permissions and to detect anomalous behavior. Regular audits of installed applications and their versions on corporate devices can help identify vulnerable instances. Training and awareness programs should emphasize the importance of physical device security and the risks of sharing devices. Finally, organizations should consider implementing mobile device management (MDM) policies that restrict installation of unauthorized applications and enforce security configurations.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2021-44470: information disclosure in Intel(R) Connect M Android application
Description
Incorrect default permissions for the Intel(R) Connect M Android application before version 1.7.4 may allow an authenticated user to potentially enable information disclosure via local access.
AI-Powered Analysis
Technical Analysis
CVE-2021-44470 is a medium-severity vulnerability affecting the Intel(R) Connect M Android application versions prior to 1.7.4. The root cause of this vulnerability is incorrect default permissions set within the application, which may allow an authenticated local user to disclose sensitive information. Specifically, the flaw relates to improper access control (CWE-276), where the application does not adequately restrict access to certain data or resources. An attacker with legitimate access to the device and the application could exploit this vulnerability to gain unauthorized access to confidential information stored or processed by the app. The vulnerability does not require user interaction beyond authentication, and it is exploitable only with local access (AV:L), meaning the attacker must have physical or logical access to the device. The CVSS 3.1 base score is 5.5, reflecting a medium severity level, with a high impact on confidentiality but no impact on integrity or availability. No known exploits are currently reported in the wild, and no patches or updates are explicitly linked in the provided data, though upgrading to version 1.7.4 or later is implied to remediate the issue.
Potential Impact
For European organizations, the impact of this vulnerability depends largely on the deployment of the Intel Connect M Android application within their environments. Organizations using this app on employee or operational devices risk unauthorized disclosure of sensitive information if an attacker gains authenticated local access to these devices. This could lead to leakage of confidential corporate data, potentially including intellectual property, user credentials, or other sensitive operational details. The risk is heightened in environments where devices are shared, lost, or stolen, or where insider threats exist. Although the vulnerability does not allow remote exploitation, the local access requirement means that physical security and endpoint management are critical. In sectors with strict data protection regulations such as GDPR, unauthorized information disclosure could result in compliance violations and reputational damage. The medium severity suggests that while the threat is not critical, it should not be ignored, especially in high-security or regulated environments.
Mitigation Recommendations
European organizations should ensure that all instances of the Intel Connect M Android application are updated to version 1.7.4 or later, where this vulnerability is addressed. Since no direct patch links are provided, organizations should verify updates through official Intel or trusted app distribution channels. Additionally, organizations should enforce strict device access controls, including strong authentication mechanisms and device encryption, to mitigate the risk of unauthorized local access. Endpoint management solutions should be employed to monitor and restrict application permissions and to detect anomalous behavior. Regular audits of installed applications and their versions on corporate devices can help identify vulnerable instances. Training and awareness programs should emphasize the importance of physical device security and the risks of sharing devices. Finally, organizations should consider implementing mobile device management (MDM) policies that restrict installation of unauthorized applications and enforce security configurations.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- intel
- Date Reserved
- 2021-11-30T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981ec4522896dcbdbc29
Added to database: 5/21/2025, 9:08:46 AM
Last enriched: 7/6/2025, 10:42:00 PM
Last updated: 8/15/2025, 11:51:13 PM
Views: 19
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.