CVE-2025-10971: CWE-922 Insecure Storage of Sensitive Information in FERMAX ELECTRÓNICA S.A.U MeetMe
CVE-2025-10971 is a high-severity vulnerability affecting the MeetMe application by FERMAX ELECTRÓNICA S. A. U on iOS and Android platforms. The flaw involves insecure storage of sensitive information within the app, allowing unauthorized retrieval of embedded sensitive data. Exploitation requires local access with high attack complexity and partial privileges, but no user interaction is needed. The vulnerability impacts confidentiality, integrity, and availability of sensitive data stored by the app. Although no known exploits are currently in the wild, the high CVSS score (8. 8) indicates significant risk if exploited. European organizations using MeetMe could face data breaches and operational disruptions. Mitigation requires FERMAX to release patches and users to update promptly, alongside secure mobile device management and encryption practices.
AI Analysis
Technical Summary
CVE-2025-10971 is classified under CWE-922, which pertains to the insecure storage of sensitive information. The vulnerability exists in the MeetMe application developed by FERMAX ELECTRÓNICA S.A.U, affecting versions up to 2.2.5 on both iOS and Android platforms. The core issue is that sensitive data embedded within the application is stored insecurely, making it retrievable by unauthorized parties. The CVSS 4.0 vector indicates that exploitation requires local access (AV:L), high attack complexity (AC:H), partial privileges (AT:P), no privileges required (PR:N), and no user interaction (UI:N). The vulnerability impacts confidentiality, integrity, and availability at high levels, with scope and security impact also high. This suggests that an attacker with local access but limited privileges could extract sensitive data, potentially leading to data leakage, unauthorized data manipulation, or disruption of service. The lack of known exploits in the wild suggests it is not yet actively exploited, but the severity score and nature of the vulnerability make it a critical concern. The absence of patch links indicates that a fix may not yet be publicly available, emphasizing the need for immediate vendor response and user caution. The vulnerability affects embedded sensitive data storage mechanisms, which could include credentials, tokens, or other confidential information stored insecurely on mobile devices, increasing the risk of compromise if devices are lost, stolen, or accessed by malicious actors.
Potential Impact
For European organizations, the insecure storage of sensitive information in MeetMe could lead to significant data breaches, especially if the app is used in environments handling confidential communications or operational data. Compromise of embedded sensitive data could facilitate unauthorized access to corporate networks or services, leading to further exploitation or lateral movement within IT infrastructure. The impact extends to potential regulatory non-compliance under GDPR due to exposure of personal data, resulting in legal and financial penalties. Operationally, organizations relying on MeetMe for communication or access control could face disruptions if attackers manipulate or extract critical data. The vulnerability's requirement for local access limits remote exploitation but raises concerns for organizations with mobile workforce or BYOD policies, where device theft or loss is a risk. The high attack complexity and partial privileges required reduce the likelihood of widespread exploitation but do not eliminate the threat, especially from insider threats or targeted attacks. Overall, the vulnerability poses a high risk to confidentiality and integrity of sensitive information within European enterprises using the affected app.
Mitigation Recommendations
FERMAX ELECTRÓNICA S.A.U should prioritize developing and releasing a security patch that properly secures sensitive data storage within the MeetMe app, employing strong encryption and secure storage APIs compliant with platform best practices. Until a patch is available, organizations should enforce strict mobile device management (MDM) policies, including device encryption, strong authentication, and remote wipe capabilities to mitigate risks from lost or stolen devices. Users should be advised to avoid installing or using vulnerable versions of MeetMe and to update immediately once a patch is released. Conducting security audits and penetration testing on mobile applications can help identify similar issues proactively. Additionally, organizations should monitor for unusual local access attempts and educate employees about the risks of insecure app data storage. Implementing application-level encryption for sensitive data and restricting app permissions can further reduce exposure. Finally, maintaining an inventory of mobile applications and their versions across the organization will aid in rapid response and patch management.
Affected Countries
Spain, Germany, France, Italy, United Kingdom, Netherlands, Belgium
CVE-2025-10971: CWE-922 Insecure Storage of Sensitive Information in FERMAX ELECTRÓNICA S.A.U MeetMe
Description
CVE-2025-10971 is a high-severity vulnerability affecting the MeetMe application by FERMAX ELECTRÓNICA S. A. U on iOS and Android platforms. The flaw involves insecure storage of sensitive information within the app, allowing unauthorized retrieval of embedded sensitive data. Exploitation requires local access with high attack complexity and partial privileges, but no user interaction is needed. The vulnerability impacts confidentiality, integrity, and availability of sensitive data stored by the app. Although no known exploits are currently in the wild, the high CVSS score (8. 8) indicates significant risk if exploited. European organizations using MeetMe could face data breaches and operational disruptions. Mitigation requires FERMAX to release patches and users to update promptly, alongside secure mobile device management and encryption practices.
AI-Powered Analysis
Technical Analysis
CVE-2025-10971 is classified under CWE-922, which pertains to the insecure storage of sensitive information. The vulnerability exists in the MeetMe application developed by FERMAX ELECTRÓNICA S.A.U, affecting versions up to 2.2.5 on both iOS and Android platforms. The core issue is that sensitive data embedded within the application is stored insecurely, making it retrievable by unauthorized parties. The CVSS 4.0 vector indicates that exploitation requires local access (AV:L), high attack complexity (AC:H), partial privileges (AT:P), no privileges required (PR:N), and no user interaction (UI:N). The vulnerability impacts confidentiality, integrity, and availability at high levels, with scope and security impact also high. This suggests that an attacker with local access but limited privileges could extract sensitive data, potentially leading to data leakage, unauthorized data manipulation, or disruption of service. The lack of known exploits in the wild suggests it is not yet actively exploited, but the severity score and nature of the vulnerability make it a critical concern. The absence of patch links indicates that a fix may not yet be publicly available, emphasizing the need for immediate vendor response and user caution. The vulnerability affects embedded sensitive data storage mechanisms, which could include credentials, tokens, or other confidential information stored insecurely on mobile devices, increasing the risk of compromise if devices are lost, stolen, or accessed by malicious actors.
Potential Impact
For European organizations, the insecure storage of sensitive information in MeetMe could lead to significant data breaches, especially if the app is used in environments handling confidential communications or operational data. Compromise of embedded sensitive data could facilitate unauthorized access to corporate networks or services, leading to further exploitation or lateral movement within IT infrastructure. The impact extends to potential regulatory non-compliance under GDPR due to exposure of personal data, resulting in legal and financial penalties. Operationally, organizations relying on MeetMe for communication or access control could face disruptions if attackers manipulate or extract critical data. The vulnerability's requirement for local access limits remote exploitation but raises concerns for organizations with mobile workforce or BYOD policies, where device theft or loss is a risk. The high attack complexity and partial privileges required reduce the likelihood of widespread exploitation but do not eliminate the threat, especially from insider threats or targeted attacks. Overall, the vulnerability poses a high risk to confidentiality and integrity of sensitive information within European enterprises using the affected app.
Mitigation Recommendations
FERMAX ELECTRÓNICA S.A.U should prioritize developing and releasing a security patch that properly secures sensitive data storage within the MeetMe app, employing strong encryption and secure storage APIs compliant with platform best practices. Until a patch is available, organizations should enforce strict mobile device management (MDM) policies, including device encryption, strong authentication, and remote wipe capabilities to mitigate risks from lost or stolen devices. Users should be advised to avoid installing or using vulnerable versions of MeetMe and to update immediately once a patch is released. Conducting security audits and penetration testing on mobile applications can help identify similar issues proactively. Additionally, organizations should monitor for unusual local access attempts and educate employees about the risks of insecure app data storage. Implementing application-level encryption for sensitive data and restricting app permissions can further reduce exposure. Finally, maintaining an inventory of mobile applications and their versions across the organization will aid in rapid response and patch management.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- FERMAX
- Date Reserved
- 2025-09-25T12:13:52.534Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 692e9c175ae7112264944d48
Added to database: 12/2/2025, 7:58:15 AM
Last enriched: 12/2/2025, 8:13:21 AM
Last updated: 12/2/2025, 10:08:34 AM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13871: CWE-352 Cross-Site Request Forgery (CSRF) in ObjectPlanet Opinio
LowCVE-2025-13696: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in softdiscover Zigaform – Price Calculator & Cost Estimation Form Builder Lite
MediumCVE-2025-11726: CWE-862 Missing Authorization in beaverbuilder Beaver Builder Page Builder – Drag and Drop Website Builder
MediumCVE-2025-13685: CWE-352 Cross-Site Request Forgery (CSRF) in ays-pro Photo Gallery by Ays – Responsive Image Gallery
MediumCVE-2025-13140: CWE-352 Cross-Site Request Forgery (CSRF) in devsoftbaltic SurveyJS: Drag & Drop WordPress Form Builder to create, style and embed multiple forms of any complexity
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.