Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10971: CWE-922 Insecure Storage of Sensitive Information in FERMAX ELECTRÓNICA S.A.U MeetMe

0
High
VulnerabilityCVE-2025-10971cvecve-2025-10971cwe-922
Published: Tue Dec 02 2025 (12/02/2025, 07:55:06 UTC)
Source: CVE Database V5
Vendor/Project: FERMAX ELECTRÓNICA S.A.U
Product: MeetMe

Description

Insecure Storage of Sensitive Information vulnerability in MeetMe on iOS, Android allows Retrieve Embedded Sensitive Data. This issue affects MeetMe: through v2.2.5.

AI-Powered Analysis

AILast updated: 12/09/2025, 08:48:51 UTC

Technical Analysis

CVE-2025-10971 identifies a vulnerability classified under CWE-922 (Insecure Storage of Sensitive Information) in the MeetMe application developed by FERMAX ELECTRÓNICA S.A.U. This flaw affects versions up to 2.2.5 on iOS and Android platforms. The vulnerability arises because the application improperly stores sensitive data embedded within it, which can be retrieved by an attacker without requiring privileges or user interaction, though with high attack complexity and requiring local access (AV:L, AC:H, AT:P, PR:N, UI:N). The CVSS 4.0 vector indicates that exploitation requires local access, high complexity, and partial attack prerequisites, but no privileges or user interaction. The impact on confidentiality, integrity, and availability is high, indicating that sensitive data exposure could lead to significant compromise of user privacy and system trustworthiness. No patches are currently linked, and no known exploits exist in the wild, but the vulnerability's presence in a widely used mobile app for communication or access control systems makes it a critical concern. The insecure storage could allow attackers to extract credentials, tokens, or other sensitive embedded data, potentially enabling further attacks or unauthorized access. The vulnerability was reserved in late September 2025 and published in December 2025, indicating recent discovery and disclosure.

Potential Impact

For European organizations, the impact of CVE-2025-10971 is substantial, especially those relying on MeetMe for secure communication, building access control, or IoT device management. Exposure of embedded sensitive data can lead to unauthorized access, data breaches, and compromise of operational security. Confidentiality breaches could expose user credentials or cryptographic keys, enabling lateral movement or impersonation attacks. Integrity and availability impacts could arise if attackers manipulate or disrupt the app’s functions after gaining sensitive information. Given the high CVSS score and the nature of the vulnerability, organizations could face regulatory penalties under GDPR if personal data is compromised. The lack of current exploits does not diminish the risk, as attackers could develop exploits rapidly once details are public. The vulnerability’s requirement for local access limits remote exploitation but does not eliminate risk in environments where devices are shared, lost, or physically accessed by malicious actors. This threat is particularly critical for sectors such as critical infrastructure, government facilities, and enterprises with high security requirements.

Mitigation Recommendations

Immediate mitigation involves monitoring FERMAX ELECTRÓNICA S.A.U communications for official patches and applying updates as soon as they become available. Until patches are released, organizations should restrict physical access to devices running MeetMe, enforce strong device-level encryption, and implement mobile device management (MDM) policies to control app usage and data storage. Conduct regular audits of devices for unauthorized access or data extraction attempts. Developers and administrators should review and enhance secure storage mechanisms, such as using platform-provided secure enclaves or keychains, and avoid embedding sensitive data directly in the app. Employ runtime application self-protection (RASP) and integrity checks to detect tampering. Additionally, educate users on the risks of device sharing and the importance of securing mobile devices. Incident response plans should be updated to address potential data leakage scenarios related to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
FERMAX
Date Reserved
2025-09-25T12:13:52.534Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 692e9c175ae7112264944d48

Added to database: 12/2/2025, 7:58:15 AM

Last enriched: 12/9/2025, 8:48:51 AM

Last updated: 1/16/2026, 1:40:28 PM

Views: 90

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats