CVE-2025-10717: Improper Export of Android Application Components in intsig CamScanner App
A vulnerability has been found in intsig CamScanner App 6.91.1.5.250711 on Android. Affected by this issue is some unknown functionality of the file AndroidManifest.xml of the component com.intsig.camscanner. The manipulation leads to improper export of android application components. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-10717 is a medium-severity vulnerability affecting the intsig CamScanner App version 6.91.1.5.250711 on Android devices. The root cause lies in improper exportation of Android application components declared in the app's AndroidManifest.xml file, specifically within the component com.intsig.camscanner. Improper export means that components such as activities, services, or broadcast receivers are made accessible to other apps or processes without adequate access control. This can allow a local attacker—someone with physical or logical access to the device—to interact with these components in unintended ways. The vulnerability does not require user interaction or elevated privileges beyond local access, and no authentication is needed to exploit it. The CVSS 4.0 vector indicates low attack complexity and low privileges required, with partial impact on confidentiality, integrity, and availability. Although the exploit has been publicly disclosed, there are no known exploits actively used in the wild yet. The vendor was notified but did not respond or provide a patch, leaving users exposed. This vulnerability could be leveraged to execute unauthorized actions within the app context, potentially leading to data leakage, unauthorized data modification, or disruption of app functionality. Since CamScanner is widely used for document scanning and management, exploitation could compromise sensitive scanned documents or metadata stored or processed by the app. The lack of vendor response and patch availability increases the risk for users who cannot easily remediate the issue.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to employees or users who utilize the CamScanner app on Android devices for handling sensitive documents. If exploited, attackers with local access could manipulate app components to access or alter confidential scanned documents, potentially leading to data breaches involving personal data, intellectual property, or business-critical information. This could result in violations of GDPR requirements concerning data confidentiality and integrity, leading to regulatory penalties and reputational damage. The impact is heightened in sectors with strict data protection needs such as finance, healthcare, legal, and government agencies. Additionally, compromised devices could serve as entry points for further lateral attacks within corporate networks if mobile device management (MDM) controls are insufficient. The medium severity rating suggests that while the vulnerability is not trivially exploitable remotely, the consequences of local exploitation can be significant, especially in environments where devices are shared, lost, or physically accessed by unauthorized personnel.
Mitigation Recommendations
Given the absence of an official patch from the vendor, European organizations should implement the following specific mitigations: 1) Restrict installation and use of the vulnerable CamScanner app version on corporate-managed Android devices via MDM solutions, enforcing app whitelisting or blacklisting policies. 2) Educate users about the risks of local device access and enforce strong device-level security controls such as screen locks, biometric authentication, and encryption to prevent unauthorized physical access. 3) Monitor devices for unusual app behavior or inter-process communication that could indicate exploitation attempts. 4) Where possible, replace CamScanner with alternative scanning applications that have a stronger security posture and timely patching history. 5) Implement strict data handling policies to avoid storing highly sensitive documents solely on mobile devices without additional encryption or secure containerization. 6) Regularly audit installed app versions and promptly remove or update vulnerable versions once patches become available. 7) Employ endpoint detection and response (EDR) tools capable of detecting anomalous activity related to app component misuse.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Ireland
CVE-2025-10717: Improper Export of Android Application Components in intsig CamScanner App
Description
A vulnerability has been found in intsig CamScanner App 6.91.1.5.250711 on Android. Affected by this issue is some unknown functionality of the file AndroidManifest.xml of the component com.intsig.camscanner. The manipulation leads to improper export of android application components. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-10717 is a medium-severity vulnerability affecting the intsig CamScanner App version 6.91.1.5.250711 on Android devices. The root cause lies in improper exportation of Android application components declared in the app's AndroidManifest.xml file, specifically within the component com.intsig.camscanner. Improper export means that components such as activities, services, or broadcast receivers are made accessible to other apps or processes without adequate access control. This can allow a local attacker—someone with physical or logical access to the device—to interact with these components in unintended ways. The vulnerability does not require user interaction or elevated privileges beyond local access, and no authentication is needed to exploit it. The CVSS 4.0 vector indicates low attack complexity and low privileges required, with partial impact on confidentiality, integrity, and availability. Although the exploit has been publicly disclosed, there are no known exploits actively used in the wild yet. The vendor was notified but did not respond or provide a patch, leaving users exposed. This vulnerability could be leveraged to execute unauthorized actions within the app context, potentially leading to data leakage, unauthorized data modification, or disruption of app functionality. Since CamScanner is widely used for document scanning and management, exploitation could compromise sensitive scanned documents or metadata stored or processed by the app. The lack of vendor response and patch availability increases the risk for users who cannot easily remediate the issue.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to employees or users who utilize the CamScanner app on Android devices for handling sensitive documents. If exploited, attackers with local access could manipulate app components to access or alter confidential scanned documents, potentially leading to data breaches involving personal data, intellectual property, or business-critical information. This could result in violations of GDPR requirements concerning data confidentiality and integrity, leading to regulatory penalties and reputational damage. The impact is heightened in sectors with strict data protection needs such as finance, healthcare, legal, and government agencies. Additionally, compromised devices could serve as entry points for further lateral attacks within corporate networks if mobile device management (MDM) controls are insufficient. The medium severity rating suggests that while the vulnerability is not trivially exploitable remotely, the consequences of local exploitation can be significant, especially in environments where devices are shared, lost, or physically accessed by unauthorized personnel.
Mitigation Recommendations
Given the absence of an official patch from the vendor, European organizations should implement the following specific mitigations: 1) Restrict installation and use of the vulnerable CamScanner app version on corporate-managed Android devices via MDM solutions, enforcing app whitelisting or blacklisting policies. 2) Educate users about the risks of local device access and enforce strong device-level security controls such as screen locks, biometric authentication, and encryption to prevent unauthorized physical access. 3) Monitor devices for unusual app behavior or inter-process communication that could indicate exploitation attempts. 4) Where possible, replace CamScanner with alternative scanning applications that have a stronger security posture and timely patching history. 5) Implement strict data handling policies to avoid storing highly sensitive documents solely on mobile devices without additional encryption or secure containerization. 6) Regularly audit installed app versions and promptly remove or update vulnerable versions once patches become available. 7) Employ endpoint detection and response (EDR) tools capable of detecting anomalous activity related to app component misuse.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-19T09:34:28.623Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68cd6bdc148332b17b6b893f
Added to database: 9/19/2025, 2:42:36 PM
Last enriched: 9/19/2025, 2:45:46 PM
Last updated: 9/19/2025, 3:30:00 PM
Views: 2
Related Threats
CVE-2025-55910: n/a
UnknownCVE-2025-59427: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in cloudflare workers-sdk
LowCVE-2025-10647: CWE-434 Unrestricted Upload of File with Dangerous Type in salzano Embed PDF for WPForms
HighCVE-2025-10630: CWE-20 Improper Input Validation in Grafana grafana-zabbix-plugin
MediumCVE-2025-7702: CWE-601 URL Redirection to Untrusted Site ('Open Redirect') in Pusula Communication Information Internet Industry and Trade Ltd. Co. Manageable Email Sending System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.