Skip to main content

CVE-2025-47820: CWE-312 Cleartext Storage of Sensitive Information in Flock Safety Gunshot Detection devices

Low
VulnerabilityCVE-2025-47820cvecve-2025-47820cwe-312
Published: Fri Jun 27 2025 (06/27/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: Flock Safety
Product: Gunshot Detection devices

Description

Flock Safety Gunshot Detection devices before 1.3 have cleartext storage of code.

AI-Powered Analysis

AILast updated: 06/27/2025, 02:35:30 UTC

Technical Analysis

CVE-2025-47820 is a vulnerability identified in Flock Safety Gunshot Detection devices prior to version 1.3. The core issue is the cleartext storage of code within these devices. This means that sensitive code or configuration data is stored without encryption or adequate protection, potentially allowing unauthorized parties with physical or network access to retrieve and analyze this data. The vulnerability has a CVSS v3.1 base score of 2.0, indicating a low severity level. The vector string (CVSS:3.1/AC:H/AV:P/A:N/C:L/I:N/PR:N/S:U/UI:N) reveals that exploitation requires high attack complexity, physical access to the device, and no privileges or user interaction are needed. The impact is limited to a low confidentiality loss, with no impact on integrity or availability. There are no known exploits in the wild, and no patches or mitigation links have been provided yet. The vulnerability primarily concerns confidentiality because the cleartext storage could expose proprietary code or sensitive configuration details, which might aid attackers in crafting further attacks or reverse engineering the device's operation. However, since the device requires physical presence or privileged access to exploit, remote exploitation is not feasible. The lack of integrity or availability impact means the device's core functionality remains intact even if the vulnerability is exploited.

Potential Impact

For European organizations deploying Flock Safety Gunshot Detection devices, this vulnerability poses a limited but tangible risk. The exposure of cleartext code could allow attackers with physical access—such as insiders, maintenance personnel, or intruders who gain proximity—to extract sensitive information. This could facilitate reverse engineering, potentially revealing weaknesses in detection algorithms or enabling spoofing attacks in the future. However, the low CVSS score and the requirement for physical access reduce the likelihood of widespread exploitation. The confidentiality breach could undermine trust in the device's security and potentially expose proprietary technology. Organizations in sensitive sectors like law enforcement, public safety, or critical infrastructure that rely on these devices should be particularly cautious, as any compromise of detection capabilities could have operational consequences. Nevertheless, the absence of integrity or availability impact means that the device's primary function—gunshot detection—remains reliable despite this vulnerability.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize upgrading all Flock Safety Gunshot Detection devices to version 1.3 or later, where the cleartext storage issue is presumably resolved. Until patches are available, physical security controls must be strengthened to prevent unauthorized access to the devices, including secure mounting, tamper-evident seals, and restricted access areas. Regular audits and inspections should be conducted to detect any signs of tampering. Additionally, organizations should implement strict access control policies for personnel with physical proximity to these devices. If possible, network segmentation and monitoring should be employed to detect unusual access patterns or attempts to extract data. Finally, organizations should engage with the vendor for official patches or guidance and monitor for any updates or advisories related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-05-10T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 685dffcbca1063fb874e095a

Added to database: 6/27/2025, 2:19:55 AM

Last enriched: 6/27/2025, 2:35:30 AM

Last updated: 8/11/2025, 12:19:29 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats