CVE-2025-50862: n/a
The Lotus Cars Android app (com.lotus.carsdomestic.intl) 1.2.8 has allowBackup=true set in its manifest, allowing data exfiltration via ADB backup on rooted or debug-enabled devices. This presents a risk of user data exposure.
AI Analysis
Technical Summary
CVE-2025-50862 is a medium severity vulnerability affecting the Lotus Cars Android application (package name com.lotus.carsdomestic.intl) version 1.2.8. The vulnerability arises because the app's Android manifest file has the attribute allowBackup set to true. This setting permits the app's data to be backed up via Android Debug Bridge (ADB) backup functionality. On devices that are either rooted or have debugging enabled, an attacker with local access can leverage this backup capability to extract sensitive user data stored by the app. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The CVSS v3.1 base score is 5.9, indicating a medium severity level, with the vector AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L. This means the attack requires local access (local vector), low attack complexity, no privileges or user interaction needed, and results in low confidentiality, integrity, and availability impacts. No known exploits are currently reported in the wild, and no patches or updates have been linked yet. The vulnerability primarily affects user data confidentiality and integrity by allowing unauthorized data exfiltration through backup mechanisms on vulnerable devices. The issue is specifically relevant to rooted or debug-enabled Android devices, which are less common in general consumer environments but may be more prevalent among developers, testers, or advanced users. The vulnerability does not affect devices without debugging enabled or that are not rooted, limiting the attack surface somewhat. However, if exploited, sensitive user data could be exposed or tampered with, potentially leading to privacy violations or further attacks.
Potential Impact
For European organizations, the impact of this vulnerability depends largely on the usage of the Lotus Cars Android app within their user base or employee devices. Organizations involved in automotive services, dealerships, or Lotus Cars customers in Europe could face risks of user data exposure if devices are rooted or have debugging enabled. The vulnerability could lead to leakage of personal or proprietary information stored within the app, which might include user credentials, vehicle data, or other sensitive information. This exposure could undermine user trust and result in reputational damage. Additionally, if corporate devices are affected, it could lead to broader data leakage or lateral movement within enterprise networks. However, since exploitation requires local access and rooted/debug-enabled devices, the risk to large-scale enterprise infrastructure is limited. Still, organizations should consider the potential for insider threats or targeted attacks where adversaries gain physical or debug access to devices. Compliance with European data protection regulations such as GDPR could be impacted if personal data is compromised, leading to legal and financial consequences.
Mitigation Recommendations
To mitigate this vulnerability, European organizations and users should: 1) Disable USB debugging on all Android devices unless explicitly needed for development or troubleshooting. 2) Avoid rooting devices used for corporate or personal purposes to reduce the attack surface. 3) Monitor and restrict physical access to devices to prevent unauthorized local access. 4) For developers or testers who require debugging, ensure that devices are used in secure environments and wiped after use. 5) Lotus Cars should release an app update that sets allowBackup=false in the Android manifest to prevent backup-based data exfiltration. Until a patch is available, users should uninstall or avoid using version 1.2.8 of the app on vulnerable devices. 6) Employ mobile device management (MDM) solutions to enforce security policies that disable debugging and prevent rooting. 7) Educate users about the risks of enabling developer options and rooting their devices. 8) Regularly audit devices for compliance with security policies and detect unauthorized configurations. These steps go beyond generic advice by focusing on controlling device configurations and app-specific settings to reduce the likelihood of exploitation.
Affected Countries
United Kingdom, Germany, France, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2025-50862: n/a
Description
The Lotus Cars Android app (com.lotus.carsdomestic.intl) 1.2.8 has allowBackup=true set in its manifest, allowing data exfiltration via ADB backup on rooted or debug-enabled devices. This presents a risk of user data exposure.
AI-Powered Analysis
Technical Analysis
CVE-2025-50862 is a medium severity vulnerability affecting the Lotus Cars Android application (package name com.lotus.carsdomestic.intl) version 1.2.8. The vulnerability arises because the app's Android manifest file has the attribute allowBackup set to true. This setting permits the app's data to be backed up via Android Debug Bridge (ADB) backup functionality. On devices that are either rooted or have debugging enabled, an attacker with local access can leverage this backup capability to extract sensitive user data stored by the app. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The CVSS v3.1 base score is 5.9, indicating a medium severity level, with the vector AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L. This means the attack requires local access (local vector), low attack complexity, no privileges or user interaction needed, and results in low confidentiality, integrity, and availability impacts. No known exploits are currently reported in the wild, and no patches or updates have been linked yet. The vulnerability primarily affects user data confidentiality and integrity by allowing unauthorized data exfiltration through backup mechanisms on vulnerable devices. The issue is specifically relevant to rooted or debug-enabled Android devices, which are less common in general consumer environments but may be more prevalent among developers, testers, or advanced users. The vulnerability does not affect devices without debugging enabled or that are not rooted, limiting the attack surface somewhat. However, if exploited, sensitive user data could be exposed or tampered with, potentially leading to privacy violations or further attacks.
Potential Impact
For European organizations, the impact of this vulnerability depends largely on the usage of the Lotus Cars Android app within their user base or employee devices. Organizations involved in automotive services, dealerships, or Lotus Cars customers in Europe could face risks of user data exposure if devices are rooted or have debugging enabled. The vulnerability could lead to leakage of personal or proprietary information stored within the app, which might include user credentials, vehicle data, or other sensitive information. This exposure could undermine user trust and result in reputational damage. Additionally, if corporate devices are affected, it could lead to broader data leakage or lateral movement within enterprise networks. However, since exploitation requires local access and rooted/debug-enabled devices, the risk to large-scale enterprise infrastructure is limited. Still, organizations should consider the potential for insider threats or targeted attacks where adversaries gain physical or debug access to devices. Compliance with European data protection regulations such as GDPR could be impacted if personal data is compromised, leading to legal and financial consequences.
Mitigation Recommendations
To mitigate this vulnerability, European organizations and users should: 1) Disable USB debugging on all Android devices unless explicitly needed for development or troubleshooting. 2) Avoid rooting devices used for corporate or personal purposes to reduce the attack surface. 3) Monitor and restrict physical access to devices to prevent unauthorized local access. 4) For developers or testers who require debugging, ensure that devices are used in secure environments and wiped after use. 5) Lotus Cars should release an app update that sets allowBackup=false in the Android manifest to prevent backup-based data exfiltration. Until a patch is available, users should uninstall or avoid using version 1.2.8 of the app on vulnerable devices. 6) Employ mobile device management (MDM) solutions to enforce security policies that disable debugging and prevent rooting. 7) Educate users about the risks of enabling developer options and rooting their devices. 8) Regularly audit devices for compliance with security policies and detect unauthorized configurations. These steps go beyond generic advice by focusing on controlling device configurations and app-specific settings to reduce the likelihood of exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-06-16T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 689e446ead5a09ad005e52c8
Added to database: 8/14/2025, 8:17:50 PM
Last enriched: 8/22/2025, 12:56:46 AM
Last updated: 11/12/2025, 9:04:18 AM
Views: 47
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2023-46595: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Algosec Algosec FireFlow
MediumCVE-2025-12903: CWE-639 Authorization Bypass Through User-Controlled Key in mrclayton Payment Plugins Braintree For WooCommerce
HighCVE-2025-12732: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in smackcoders WP Import – Ultimate CSV XML Importer for WordPress
MediumICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Rockwell, Aveva, Schneider
MediumCVE-2025-13047: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in ViewLead Technology Bacteriology Laboratory Reporting System
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.