Skip to main content

CVE-2025-50862: n/a

Medium
VulnerabilityCVE-2025-50862cvecve-2025-50862
Published: Thu Aug 14 2025 (08/14/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

The Lotus Cars Android app (com.lotus.carsdomestic.intl) 1.2.8 has allowBackup=true set in its manifest, allowing data exfiltration via ADB backup on rooted or debug-enabled devices. This presents a risk of user data exposure.

AI-Powered Analysis

AILast updated: 08/22/2025, 00:56:46 UTC

Technical Analysis

CVE-2025-50862 is a medium severity vulnerability affecting the Lotus Cars Android application (package name com.lotus.carsdomestic.intl) version 1.2.8. The vulnerability arises because the app's Android manifest file has the attribute allowBackup set to true. This setting permits the app's data to be backed up via Android Debug Bridge (ADB) backup functionality. On devices that are either rooted or have debugging enabled, an attacker with local access can leverage this backup capability to extract sensitive user data stored by the app. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The CVSS v3.1 base score is 5.9, indicating a medium severity level, with the vector AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L. This means the attack requires local access (local vector), low attack complexity, no privileges or user interaction needed, and results in low confidentiality, integrity, and availability impacts. No known exploits are currently reported in the wild, and no patches or updates have been linked yet. The vulnerability primarily affects user data confidentiality and integrity by allowing unauthorized data exfiltration through backup mechanisms on vulnerable devices. The issue is specifically relevant to rooted or debug-enabled Android devices, which are less common in general consumer environments but may be more prevalent among developers, testers, or advanced users. The vulnerability does not affect devices without debugging enabled or that are not rooted, limiting the attack surface somewhat. However, if exploited, sensitive user data could be exposed or tampered with, potentially leading to privacy violations or further attacks.

Potential Impact

For European organizations, the impact of this vulnerability depends largely on the usage of the Lotus Cars Android app within their user base or employee devices. Organizations involved in automotive services, dealerships, or Lotus Cars customers in Europe could face risks of user data exposure if devices are rooted or have debugging enabled. The vulnerability could lead to leakage of personal or proprietary information stored within the app, which might include user credentials, vehicle data, or other sensitive information. This exposure could undermine user trust and result in reputational damage. Additionally, if corporate devices are affected, it could lead to broader data leakage or lateral movement within enterprise networks. However, since exploitation requires local access and rooted/debug-enabled devices, the risk to large-scale enterprise infrastructure is limited. Still, organizations should consider the potential for insider threats or targeted attacks where adversaries gain physical or debug access to devices. Compliance with European data protection regulations such as GDPR could be impacted if personal data is compromised, leading to legal and financial consequences.

Mitigation Recommendations

To mitigate this vulnerability, European organizations and users should: 1) Disable USB debugging on all Android devices unless explicitly needed for development or troubleshooting. 2) Avoid rooting devices used for corporate or personal purposes to reduce the attack surface. 3) Monitor and restrict physical access to devices to prevent unauthorized local access. 4) For developers or testers who require debugging, ensure that devices are used in secure environments and wiped after use. 5) Lotus Cars should release an app update that sets allowBackup=false in the Android manifest to prevent backup-based data exfiltration. Until a patch is available, users should uninstall or avoid using version 1.2.8 of the app on vulnerable devices. 6) Employ mobile device management (MDM) solutions to enforce security policies that disable debugging and prevent rooting. 7) Educate users about the risks of enabling developer options and rooting their devices. 8) Regularly audit devices for compliance with security policies and detect unauthorized configurations. These steps go beyond generic advice by focusing on controlling device configurations and app-specific settings to reduce the likelihood of exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-06-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 689e446ead5a09ad005e52c8

Added to database: 8/14/2025, 8:17:50 PM

Last enriched: 8/22/2025, 12:56:46 AM

Last updated: 9/27/2025, 12:42:27 AM

Views: 29

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats