Skip to main content

CVE-2025-10195: Improper Export of Android Application Components in Seismic App

Medium
VulnerabilityCVE-2025-10195cvecve-2025-10195
Published: Wed Sep 10 2025 (09/10/2025, 00:02:05 UTC)
Source: CVE Database V5
Product: Seismic App

Description

A vulnerability has been found in Seismic App 2.4.2 on Android. Affected is an unknown function of the file AndroidManifest.xml of the component com.seismic.doccenter. Such manipulation leads to improper export of android application components. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 09/10/2025, 00:52:05 UTC

Technical Analysis

CVE-2025-10195 is a medium-severity vulnerability affecting version 2.4.2 of the Seismic App on Android. The issue stems from improper exportation of Android application components declared in the AndroidManifest.xml file, specifically within the component identified as com.seismic.doccenter. In Android applications, components such as activities, services, broadcast receivers, and content providers can be exported to allow interaction with other applications or system components. Improper export occurs when components are unintentionally made accessible to other apps or users without adequate access controls, potentially exposing sensitive functionality or data. This vulnerability requires local access, meaning an attacker must have physical or logical access to the device where the app is installed. The vulnerability does not require user interaction or elevated privileges beyond low privileges, making it easier to exploit once local access is obtained. The CVSS 4.0 vector indicates low attack complexity and no user interaction, but limited scope and impact on confidentiality, integrity, and availability. The vendor has been notified but has not responded or issued a patch, and no known exploits are currently in the wild. The vulnerability could allow an attacker with local access to interact with the improperly exported component, potentially leading to unauthorized data access or manipulation within the app's context. Given the app's role in document management or sales enablement (typical for Seismic App), sensitive business information could be at risk if exploited.

Potential Impact

For European organizations using Seismic App 2.4.2 on Android devices, this vulnerability could lead to unauthorized local access to sensitive corporate documents or data managed by the app. While remote exploitation is not possible, insider threats or attackers with temporary device access could leverage this flaw to extract or manipulate confidential information. This risk is particularly relevant for sectors handling sensitive or regulated data such as finance, healthcare, legal, and government institutions. The lack of vendor response and patch availability increases the window of exposure. Additionally, the vulnerability could undermine trust in mobile device security policies and complicate compliance with data protection regulations like GDPR if sensitive personal or corporate data is compromised. However, the medium severity and local attack vector limit the overall risk to scenarios involving physical device compromise or insider threat actors.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Immediately audit all Android devices running Seismic App 2.4.2 to identify affected installations. 2) Restrict physical and logical access to devices with the app installed, enforcing strong device-level authentication and encryption to reduce local attack feasibility. 3) Employ Mobile Device Management (MDM) solutions to monitor app usage and detect suspicious local activity or unauthorized access attempts. 4) Where possible, disable or restrict the use of the Seismic App on Android devices until a patched version is available. 5) Engage with the vendor or seek alternative secure applications with active maintenance and security responsiveness. 6) Educate users about the risks of leaving devices unattended or lending them to untrusted parties. 7) Monitor for any emerging exploit code or public proof-of-concept releases to adjust defensive measures promptly. 8) Consider implementing application sandboxing or containerization to isolate the app and limit potential damage from exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-09T16:07:41.525Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c0c7e29ed239a66bae3b6b

Added to database: 9/10/2025, 12:35:46 AM

Last enriched: 9/10/2025, 12:52:05 AM

Last updated: 9/10/2025, 3:10:19 AM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats