CVE-2025-15567: CWE-306 Missing Authentication for Critical Function in vivo Health
CVE-2025-15567 is a medium severity vulnerability affecting vivo Health versions below 5. 3. 0. 0. It stems from missing authentication controls on critical functions within the Health Module, leading to partial information disclosure. The vulnerability does not require user interaction, privileges, or network access, but can be exploited locally. Although no known exploits are currently reported in the wild, the lack of authentication allows unauthorized access to sensitive health data. Organizations using affected versions risk exposure of confidential health information, potentially violating privacy regulations. Mitigation requires updating to version 5. 3.
AI Analysis
Technical Summary
CVE-2025-15567 is a vulnerability classified under CWE-306 (Missing Authentication for Critical Function) found in the vivo Health application, specifically in versions prior to 5.3.0.0. The flaw arises because certain critical functions within the Health Module lack proper authentication mechanisms, allowing unauthorized users to access partial health information without any authentication or user interaction. The CVSS 4.0 base score is 5.1, reflecting a medium severity level, with the vector indicating local attack vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and limited confidentiality impact (VC:L). The vulnerability does not affect integrity or availability and does not require network access, limiting its exploitation scope. Although no public exploits are known, the vulnerability poses a risk of sensitive health data exposure, which can lead to privacy breaches and potential regulatory non-compliance. The issue was publicly disclosed on February 27, 2026, and no official patches were linked at the time of reporting, emphasizing the need for vendor updates and user vigilance. The vulnerability is particularly relevant for environments where vivo Health is deployed on devices used in healthcare or personal health monitoring contexts.
Potential Impact
The primary impact of CVE-2025-15567 is the unauthorized disclosure of partial health information due to missing authentication on critical functions. This can lead to privacy violations, loss of user trust, and potential legal consequences under data protection regulations such as GDPR or HIPAA. Organizations relying on vivo Health for sensitive health data management may face reputational damage and compliance risks if this vulnerability is exploited. Since exploitation requires local access, the threat is more significant in environments where devices are shared, physically accessible by unauthorized individuals, or compromised by malware. The limited confidentiality impact reduces the risk of full data leakage but still represents a meaningful exposure of sensitive information. The vulnerability does not affect system integrity or availability, so operational disruption is unlikely. However, the exposure of health data can have serious implications for individuals’ privacy and organizational compliance.
Mitigation Recommendations
To mitigate CVE-2025-15567, organizations and users should upgrade vivo Health to version 5.3.0.0 or later once the patch is released by the vendor. Until then, restrict physical and local access to devices running vulnerable versions to trusted users only. Implement device-level security controls such as strong authentication, screen locks, and encryption to prevent unauthorized local access. Monitor device usage and audit access to health data functions to detect suspicious activity. For organizations deploying vivo Health in healthcare settings, integrate endpoint security solutions that can detect and block unauthorized local access attempts. Engage with the vendor for timely updates and verify that authentication controls are properly enforced in future versions. Additionally, educate users about the risks of sharing devices and the importance of securing personal health information.
Affected Countries
China, India, Indonesia, Brazil, Russia, South Africa, Mexico, Vietnam, Thailand, Nigeria
CVE-2025-15567: CWE-306 Missing Authentication for Critical Function in vivo Health
Description
CVE-2025-15567 is a medium severity vulnerability affecting vivo Health versions below 5. 3. 0. 0. It stems from missing authentication controls on critical functions within the Health Module, leading to partial information disclosure. The vulnerability does not require user interaction, privileges, or network access, but can be exploited locally. Although no known exploits are currently reported in the wild, the lack of authentication allows unauthorized access to sensitive health data. Organizations using affected versions risk exposure of confidential health information, potentially violating privacy regulations. Mitigation requires updating to version 5. 3.
AI-Powered Analysis
Technical Analysis
CVE-2025-15567 is a vulnerability classified under CWE-306 (Missing Authentication for Critical Function) found in the vivo Health application, specifically in versions prior to 5.3.0.0. The flaw arises because certain critical functions within the Health Module lack proper authentication mechanisms, allowing unauthorized users to access partial health information without any authentication or user interaction. The CVSS 4.0 base score is 5.1, reflecting a medium severity level, with the vector indicating local attack vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and limited confidentiality impact (VC:L). The vulnerability does not affect integrity or availability and does not require network access, limiting its exploitation scope. Although no public exploits are known, the vulnerability poses a risk of sensitive health data exposure, which can lead to privacy breaches and potential regulatory non-compliance. The issue was publicly disclosed on February 27, 2026, and no official patches were linked at the time of reporting, emphasizing the need for vendor updates and user vigilance. The vulnerability is particularly relevant for environments where vivo Health is deployed on devices used in healthcare or personal health monitoring contexts.
Potential Impact
The primary impact of CVE-2025-15567 is the unauthorized disclosure of partial health information due to missing authentication on critical functions. This can lead to privacy violations, loss of user trust, and potential legal consequences under data protection regulations such as GDPR or HIPAA. Organizations relying on vivo Health for sensitive health data management may face reputational damage and compliance risks if this vulnerability is exploited. Since exploitation requires local access, the threat is more significant in environments where devices are shared, physically accessible by unauthorized individuals, or compromised by malware. The limited confidentiality impact reduces the risk of full data leakage but still represents a meaningful exposure of sensitive information. The vulnerability does not affect system integrity or availability, so operational disruption is unlikely. However, the exposure of health data can have serious implications for individuals’ privacy and organizational compliance.
Mitigation Recommendations
To mitigate CVE-2025-15567, organizations and users should upgrade vivo Health to version 5.3.0.0 or later once the patch is released by the vendor. Until then, restrict physical and local access to devices running vulnerable versions to trusted users only. Implement device-level security controls such as strong authentication, screen locks, and encryption to prevent unauthorized local access. Monitor device usage and audit access to health data functions to detect suspicious activity. For organizations deploying vivo Health in healthcare settings, integrate endpoint security solutions that can detect and block unauthorized local access attempts. Engage with the vendor for timely updates and verify that authentication controls are properly enforced in future versions. Additionally, educate users about the risks of sharing devices and the importance of securing personal health information.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Vivo
- Date Reserved
- 2026-02-06T03:04:54.467Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69a1438e32ffcdb8a2fbeb07
Added to database: 2/27/2026, 7:11:10 AM
Last enriched: 2/27/2026, 7:27:09 AM
Last updated: 2/27/2026, 8:12:02 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27776: Deserialization of untrusted data in NTT DATA INTRAMART Corporation intra-mart Accel Platform
HighCVE-2026-0980: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Red Hat Red Hat Satellite 6
HighCVE-2026-0871: Incorrect Privilege Assignment in Red Hat Red Hat build of Keycloak 26.4
MediumCVE-2025-9909: Use of Non-Canonical URL Paths for Authorization Decisions in Red Hat Red Hat Ansible Automation Platform 2.5 for RHEL 8
MediumCVE-2025-9908: Exposure of Sensitive Information to an Unauthorized Actor in Red Hat Red Hat Ansible Automation Platform 2.5 for RHEL 8
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.