Skip to main content

CVE-2025-27387: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in OPPO ColorOS

High
VulnerabilityCVE-2025-27387cvecve-2025-27387cwe-200
Published: Mon Jun 23 2025 (06/23/2025, 09:28:08 UTC)
Source: CVE Database V5
Vendor/Project: OPPO
Product: ColorOS

Description

OPPO Clone Phone uses a weak password WiFi hotspot to transfer files, resulting in Information disclosure.

AI-Powered Analysis

AILast updated: 06/23/2025, 10:05:25 UTC

Technical Analysis

CVE-2025-27387 is a high-severity vulnerability affecting OPPO's ColorOS, specifically versions 15.0.2 and below. The vulnerability arises from the implementation of the OPPO Clone Phone feature, which facilitates file transfers between devices via a WiFi hotspot. The hotspot is configured with a weak password, significantly reducing the security of the connection. This weak password allows unauthorized actors within wireless range to connect to the hotspot without proper authentication. Once connected, attackers can access sensitive information being transferred or stored during the cloning process. The vulnerability is classified under CWE-200, indicating exposure of sensitive information to unauthorized actors. The CVSS 3.1 base score of 7.4 reflects a high severity level, with the vector indicating that the attack requires adjacent network access (AV:A), has low attack complexity (AC:L), requires no privileges (PR:N), no user interaction (UI:N), and impacts confidentiality (C:H) but not integrity or availability. The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. No known exploits are currently reported in the wild, and no patches have been linked yet. The weakness fundamentally lies in the insecure configuration of the WiFi hotspot used for file transfer, which could allow an attacker to intercept or access sensitive data during the cloning process without needing any user interaction or elevated privileges.

Potential Impact

For European organizations, the primary impact of this vulnerability is the potential unauthorized disclosure of sensitive information during device cloning or file transfer operations involving OPPO devices running vulnerable versions of ColorOS. This could include corporate data, personal information, or proprietary files if employees use OPPO devices for work purposes or if such devices are present within corporate environments. The exposure could lead to data breaches, loss of confidentiality, and potential compliance violations under regulations such as GDPR. Since the vulnerability does not affect integrity or availability, the risk is focused on information leakage. The ease of exploitation (no privileges or user interaction required) increases the likelihood of opportunistic attacks, especially in environments where wireless networks are accessible to multiple users, such as offices, public spaces, or co-working areas. Organizations relying on OPPO devices for mobile operations or BYOD policies should be particularly cautious. Additionally, the scope change indicates that attackers could access data beyond the immediate device, potentially impacting connected systems or networks if lateral movement is possible.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should take the following specific actions: 1) Identify and inventory all OPPO devices running ColorOS 15.0.2 or below within the organization. 2) Restrict or disable the use of the OPPO Clone Phone feature until a vendor patch is available. 3) Educate users about the risks of connecting to or enabling weakly secured WiFi hotspots, especially in public or semi-public environments. 4) Implement network segmentation and wireless network access controls to limit exposure to unauthorized devices within corporate premises. 5) Monitor network traffic for unusual connections or data transfers associated with OPPO devices. 6) Engage with OPPO support channels to obtain updates on patch availability and apply security updates promptly once released. 7) For BYOD environments, enforce mobile device management (MDM) policies that can restrict vulnerable features or enforce security configurations. 8) Consider deploying endpoint detection and response (EDR) solutions that can detect anomalous network activity related to file transfers over WiFi hotspots. These measures go beyond generic advice by focusing on device-specific controls, user awareness, and network-level defenses tailored to the nature of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
OPPO
Date Reserved
2025-02-24T03:04:32.845Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68592327179a4edd60b65f3e

Added to database: 6/23/2025, 9:49:27 AM

Last enriched: 6/23/2025, 10:05:25 AM

Last updated: 8/12/2025, 3:10:25 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats