Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14023: na in LINE Corporation LINE client for iOS

0
Low
VulnerabilityCVE-2025-14023cvecve-2025-14023
Published: Mon Dec 15 2025 (12/15/2025, 06:45:23 UTC)
Source: CVE Database V5
Vendor/Project: LINE Corporation
Product: LINE client for iOS

Description

CVE-2025-14023 is a low-severity UI spoofing vulnerability in the LINE client for iOS versions prior to 15. 19. It arises from inconsistencies between the navigation state and the in-app browser's user interface, potentially misleading users about the trustworthiness of displayed pages or interactive elements. Exploitation requires user interaction and a high attack complexity, with no privileges needed. The vulnerability does not impact confidentiality or availability but may allow limited integrity issues through user deception. No known active exploits exist, and no patches have been linked yet. European organizations using LINE on iOS should monitor for updates and educate users about phishing risks. Countries with high LINE usage and significant iOS user bases, such as the UK, Germany, and France, are most likely affected. Mitigation includes updating to version 15. 19 or later once available, restricting in-app browser usage, and enhancing user awareness of suspicious UI elements.

AI-Powered Analysis

AILast updated: 12/15/2025, 07:15:33 UTC

Technical Analysis

CVE-2025-14023 is a vulnerability identified in the LINE client for iOS versions prior to 15.19 that allows UI spoofing due to inconsistencies between the navigation state and the in-app browser's user interface. This discrepancy can cause users to misinterpret the trust context of displayed web pages or interactive elements, potentially leading to phishing or social engineering attacks. The vulnerability stems from the application's failure to synchronize the navigation state with the UI elements shown in the embedded browser, which can be manipulated under specific conditions to present deceptive content. The CVSS 3.1 base score is 3.1, reflecting low severity, with the vector indicating network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:N), user interaction required (UI:R), unchanged scope (S:U), no confidentiality impact (C:N), low integrity impact (I:L), and no availability impact (A:N). No known exploits are currently reported in the wild, and no official patches have been linked yet, although the vendor has reserved the CVE and published the advisory. The vulnerability primarily affects the integrity of user interactions by potentially misleading users into trusting malicious content, but it does not directly compromise data confidentiality or system availability.

Potential Impact

For European organizations, the primary risk is social engineering or phishing attacks facilitated by the UI spoofing vulnerability. Attackers could craft deceptive links or content that appear trustworthy within the LINE in-app browser, tricking users into divulging sensitive information or performing unintended actions. Although the vulnerability does not directly compromise system integrity or confidentiality, the indirect impact through user deception could lead to credential theft, unauthorized access, or fraud. Organizations relying on LINE for internal or external communications, especially those with employees using iOS devices, may face increased phishing risks. The low severity and requirement for user interaction reduce the likelihood of widespread exploitation, but targeted attacks against high-value individuals or sectors remain possible. The absence of known exploits suggests limited current impact, but vigilance is necessary as attackers may develop techniques to leverage this flaw.

Mitigation Recommendations

European organizations should prioritize updating the LINE client for iOS to version 15.19 or later once the patch is released to resolve the UI spoofing issue. Until then, restricting or disabling the use of the in-app browser within LINE can reduce exposure, possibly by encouraging users to open links in external, trusted browsers. Security awareness training should emphasize the risks of UI spoofing and phishing, instructing users to verify URLs and be cautious of unexpected or suspicious links within the app. Implementing mobile device management (MDM) policies to control app versions and enforce security configurations can help maintain compliance. Additionally, monitoring for unusual user behavior or phishing attempts related to LINE communications can aid early detection. Organizations should maintain communication with LINE Corporation for timely updates and advisories.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
LY-Corporation
Date Reserved
2025-12-04T11:45:06.869Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693fb1fed9bcdf3f3dbd0788

Added to database: 12/15/2025, 7:00:14 AM

Last enriched: 12/15/2025, 7:15:33 AM

Last updated: 12/15/2025, 10:59:53 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats