CVE-2025-50862: n/a
The Lotus Cars Android app (com.lotus.carsdomestic.intl) 1.2.8 has allowBackup=true set in its manifest, allowing data exfiltration via ADB backup on rooted or debug-enabled devices. This presents a risk of user data exposure.
AI Analysis
Technical Summary
CVE-2025-50862 is a medium severity vulnerability affecting the Lotus Cars Android application (package name com.lotus.carsdomestic.intl) version 1.2.8. The vulnerability arises because the app's Android manifest file has the attribute allowBackup set to true. This setting permits the app's data to be backed up via Android Debug Bridge (ADB) backup functionality. On devices that are either rooted or have debugging enabled, an attacker with local access can leverage this backup capability to extract sensitive user data stored by the app. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The CVSS v3.1 base score is 5.9, indicating a medium severity level, with the vector AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L. This means the attack requires local access (local vector), low attack complexity, no privileges or user interaction needed, and results in low confidentiality, integrity, and availability impacts. No known exploits are currently reported in the wild, and no patches or updates have been linked yet. The vulnerability primarily affects user data confidentiality and integrity by allowing unauthorized data exfiltration through backup mechanisms on vulnerable devices. The issue is specifically relevant to rooted or debug-enabled Android devices, which are less common in general consumer environments but may be more prevalent among developers, testers, or advanced users. The vulnerability does not affect devices without debugging enabled or that are not rooted, limiting the attack surface somewhat. However, if exploited, sensitive user data could be exposed or tampered with, potentially leading to privacy violations or further attacks.
Potential Impact
For European organizations, the impact of this vulnerability depends largely on the usage of the Lotus Cars Android app within their user base or employee devices. Organizations involved in automotive services, dealerships, or Lotus Cars customers in Europe could face risks of user data exposure if devices are rooted or have debugging enabled. The vulnerability could lead to leakage of personal or proprietary information stored within the app, which might include user credentials, vehicle data, or other sensitive information. This exposure could undermine user trust and result in reputational damage. Additionally, if corporate devices are affected, it could lead to broader data leakage or lateral movement within enterprise networks. However, since exploitation requires local access and rooted/debug-enabled devices, the risk to large-scale enterprise infrastructure is limited. Still, organizations should consider the potential for insider threats or targeted attacks where adversaries gain physical or debug access to devices. Compliance with European data protection regulations such as GDPR could be impacted if personal data is compromised, leading to legal and financial consequences.
Mitigation Recommendations
To mitigate this vulnerability, European organizations and users should: 1) Disable USB debugging on all Android devices unless explicitly needed for development or troubleshooting. 2) Avoid rooting devices used for corporate or personal purposes to reduce the attack surface. 3) Monitor and restrict physical access to devices to prevent unauthorized local access. 4) For developers or testers who require debugging, ensure that devices are used in secure environments and wiped after use. 5) Lotus Cars should release an app update that sets allowBackup=false in the Android manifest to prevent backup-based data exfiltration. Until a patch is available, users should uninstall or avoid using version 1.2.8 of the app on vulnerable devices. 6) Employ mobile device management (MDM) solutions to enforce security policies that disable debugging and prevent rooting. 7) Educate users about the risks of enabling developer options and rooting their devices. 8) Regularly audit devices for compliance with security policies and detect unauthorized configurations. These steps go beyond generic advice by focusing on controlling device configurations and app-specific settings to reduce the likelihood of exploitation.
Affected Countries
United Kingdom, Germany, France, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2025-50862: n/a
Description
The Lotus Cars Android app (com.lotus.carsdomestic.intl) 1.2.8 has allowBackup=true set in its manifest, allowing data exfiltration via ADB backup on rooted or debug-enabled devices. This presents a risk of user data exposure.
AI-Powered Analysis
Technical Analysis
CVE-2025-50862 is a medium severity vulnerability affecting the Lotus Cars Android application (package name com.lotus.carsdomestic.intl) version 1.2.8. The vulnerability arises because the app's Android manifest file has the attribute allowBackup set to true. This setting permits the app's data to be backed up via Android Debug Bridge (ADB) backup functionality. On devices that are either rooted or have debugging enabled, an attacker with local access can leverage this backup capability to extract sensitive user data stored by the app. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The CVSS v3.1 base score is 5.9, indicating a medium severity level, with the vector AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L. This means the attack requires local access (local vector), low attack complexity, no privileges or user interaction needed, and results in low confidentiality, integrity, and availability impacts. No known exploits are currently reported in the wild, and no patches or updates have been linked yet. The vulnerability primarily affects user data confidentiality and integrity by allowing unauthorized data exfiltration through backup mechanisms on vulnerable devices. The issue is specifically relevant to rooted or debug-enabled Android devices, which are less common in general consumer environments but may be more prevalent among developers, testers, or advanced users. The vulnerability does not affect devices without debugging enabled or that are not rooted, limiting the attack surface somewhat. However, if exploited, sensitive user data could be exposed or tampered with, potentially leading to privacy violations or further attacks.
Potential Impact
For European organizations, the impact of this vulnerability depends largely on the usage of the Lotus Cars Android app within their user base or employee devices. Organizations involved in automotive services, dealerships, or Lotus Cars customers in Europe could face risks of user data exposure if devices are rooted or have debugging enabled. The vulnerability could lead to leakage of personal or proprietary information stored within the app, which might include user credentials, vehicle data, or other sensitive information. This exposure could undermine user trust and result in reputational damage. Additionally, if corporate devices are affected, it could lead to broader data leakage or lateral movement within enterprise networks. However, since exploitation requires local access and rooted/debug-enabled devices, the risk to large-scale enterprise infrastructure is limited. Still, organizations should consider the potential for insider threats or targeted attacks where adversaries gain physical or debug access to devices. Compliance with European data protection regulations such as GDPR could be impacted if personal data is compromised, leading to legal and financial consequences.
Mitigation Recommendations
To mitigate this vulnerability, European organizations and users should: 1) Disable USB debugging on all Android devices unless explicitly needed for development or troubleshooting. 2) Avoid rooting devices used for corporate or personal purposes to reduce the attack surface. 3) Monitor and restrict physical access to devices to prevent unauthorized local access. 4) For developers or testers who require debugging, ensure that devices are used in secure environments and wiped after use. 5) Lotus Cars should release an app update that sets allowBackup=false in the Android manifest to prevent backup-based data exfiltration. Until a patch is available, users should uninstall or avoid using version 1.2.8 of the app on vulnerable devices. 6) Employ mobile device management (MDM) solutions to enforce security policies that disable debugging and prevent rooting. 7) Educate users about the risks of enabling developer options and rooting their devices. 8) Regularly audit devices for compliance with security policies and detect unauthorized configurations. These steps go beyond generic advice by focusing on controlling device configurations and app-specific settings to reduce the likelihood of exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-06-16T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 689e446ead5a09ad005e52c8
Added to database: 8/14/2025, 8:17:50 PM
Last enriched: 8/22/2025, 12:56:46 AM
Last updated: 9/27/2025, 12:42:27 AM
Views: 29
Related Threats
CVE-2025-11138: OS Command Injection in mirweiye wenkucms
MediumCVE-2025-11136: Unrestricted Upload in YiFang CMS
MediumCVE-2025-11135: Deserialization in pmTicket Project-Management-Software
MediumCVE-2025-9904: CWE-696: Incorrect Behavior Order in Canon Inc. Generic Plus PCL6 Printer Driver
MediumCVE-2025-9903: CWE-787: Out-of-bounds Write in Canon Inc. Generic Plus PCL6 Printer Driver
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.