Skip to main content

CVE-2025-46018: n/a

Medium
VulnerabilityCVE-2025-46018cvecve-2025-46018
Published: Fri Aug 01 2025 (08/01/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

CSC Pay Mobile App 2.19.4 (fixed in version 2.20.0) contains a vulnerability allowing users to bypass payment authorization by disabling Bluetooth at a specific point during a transaction. This could result in unauthorized use of laundry services and potential financial loss.

AI-Powered Analysis

AILast updated: 08/01/2025, 14:02:41 UTC

Technical Analysis

CVE-2025-46018 is a vulnerability identified in the CSC Pay Mobile App version 2.19.4, which was addressed in version 2.20.0. The flaw allows users to bypass payment authorization by disabling Bluetooth at a specific point during a transaction. The CSC Pay Mobile App appears to rely on Bluetooth connectivity as part of its payment authorization process, likely to communicate with payment terminals or devices such as laundry machines. By interrupting Bluetooth communication at a critical moment, an attacker or user can circumvent the normal authorization checks, enabling unauthorized use of services without completing valid payment. This vulnerability specifically impacts the integrity of the payment process, as it allows transactions to be completed without proper authorization, potentially leading to financial losses for service providers. The vulnerability does not require user interaction beyond disabling Bluetooth, which is a simple action, and does not require authentication to exploit if the user has access to the app and the service. No known exploits are currently reported in the wild, and no CVSS score has been assigned. The vulnerability is limited to a specific app version and fixed in a subsequent release, indicating a patch is available but may not yet be widely deployed.

Potential Impact

For European organizations, particularly those operating laundromats or similar vending services using the CSC Pay Mobile App, this vulnerability could lead to unauthorized service usage and direct financial losses. The integrity of payment transactions is compromised, potentially undermining trust in mobile payment solutions. Organizations may face increased operational costs due to unpaid usage and may need to invest in additional monitoring or alternative payment verification methods. If exploited at scale, this could also damage brand reputation and customer confidence in mobile payment technologies. While the impact on confidentiality and availability is minimal, the financial and transactional integrity impact is significant. Additionally, organizations may face compliance and audit challenges if payment authorization controls are bypassed.

Mitigation Recommendations

Organizations should promptly update the CSC Pay Mobile App to version 2.20.0 or later, where the vulnerability is fixed. Until the update is applied, organizations can implement monitoring to detect unusual usage patterns indicative of unauthorized transactions. They should also educate users and staff about the risk of disabling Bluetooth during transactions and consider technical controls to prevent Bluetooth from being disabled during payment processes, such as app-level checks or device management policies. Where possible, integrating additional authentication or transaction verification steps independent of Bluetooth connectivity can reduce risk. Vendors should be engaged to ensure timely patch deployment and to verify that the fix is effective in their operational environment. Regular audits of payment transaction logs can help identify potential exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-04-22T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 688cc57fad5a09ad00c944f4

Added to database: 8/1/2025, 1:47:43 PM

Last enriched: 8/1/2025, 2:02:41 PM

Last updated: 8/2/2025, 3:24:07 AM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats