Skip to main content

CVE-2025-5098: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Mobile Dynamix PrinterShare Mobile Print

Critical
VulnerabilityCVE-2025-5098cvecve-2025-5098cwe-200cwe-313
Published: Fri May 23 2025 (05/23/2025, 01:06:25 UTC)
Source: CVE
Vendor/Project: Mobile Dynamix
Product: PrinterShare Mobile Print

Description

PrinterShare Android application allows the capture of Gmail authentication tokens that can be reused to access a user's Gmail account without proper authorization.

AI-Powered Analysis

AILast updated: 07/08/2025, 04:27:20 UTC

Technical Analysis

CVE-2025-5098 is a critical security vulnerability identified in the PrinterShare Mobile Print Android application developed by Mobile Dynamix, specifically affecting version 12.15.01. This vulnerability involves the unauthorized exposure of sensitive information, namely Gmail authentication tokens, which can be captured by an attacker. These tokens, once obtained, allow the attacker to access the victim's Gmail account without proper authorization, bypassing normal authentication mechanisms. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) and CWE-313 (Cleartext Storage of Sensitive Information), indicating that sensitive data is either improperly protected or exposed in a manner accessible to unauthorized parties. The CVSS 3.1 base score of 9.1 reflects the critical nature of this flaw, with an attack vector that is network-based (AV:N), requiring no privileges (PR:N) or user interaction (UI:N), and impacting confidentiality and integrity at a high level (C:H/I:H/A:N). The vulnerability does not affect availability but allows full compromise of Gmail account confidentiality and integrity. No known exploits are currently reported in the wild, and no patches have been published as of the vulnerability disclosure date (May 23, 2025). The lack of patch availability increases the urgency for mitigation and risk management. The vulnerability likely arises from insecure handling or storage of OAuth tokens or similar authentication credentials within the mobile app, enabling attackers to intercept or extract these tokens through network interception, local device compromise, or app-level flaws. This flaw poses a significant risk to users relying on PrinterShare Mobile Print for printing services, especially those who use Gmail accounts for authentication or email services integrated with the app.

Potential Impact

For European organizations, this vulnerability presents a severe risk to the confidentiality and integrity of corporate Gmail accounts, which are often used for sensitive communications, document sharing, and identity verification. Compromise of Gmail accounts can lead to unauthorized access to emails, sensitive attachments, and potentially other linked Google services such as Drive, Calendar, and Contacts. This can result in data breaches, intellectual property theft, spear-phishing campaigns, and lateral movement within corporate networks. The vulnerability's network-based exploitability and lack of required user interaction make it highly dangerous in environments where employees use PrinterShare Mobile Print on corporate or personal devices connected to enterprise networks. Given the widespread use of Gmail and Android devices in Europe, especially in sectors like finance, healthcare, and government, the potential impact includes regulatory non-compliance (e.g., GDPR violations due to data exposure), reputational damage, and financial losses. The absence of a patch increases the window of exposure, necessitating immediate compensating controls. Additionally, the vulnerability could be exploited by advanced persistent threat (APT) actors targeting European entities, leveraging the flaw to gain footholds or exfiltrate sensitive information.

Mitigation Recommendations

Immediate mitigation should focus on limiting the exposure of Gmail authentication tokens within the PrinterShare Mobile Print app environment. Organizations should: 1) Advise users to avoid using PrinterShare Mobile Print version 12.15.01 until a patch is released. 2) Monitor and restrict network traffic to and from the PrinterShare app using mobile device management (MDM) solutions, including blocking or inspecting traffic for suspicious token leakage. 3) Enforce multi-factor authentication (MFA) on all Gmail accounts to reduce the risk of token misuse. 4) Implement conditional access policies in Google Workspace to detect and block anomalous login attempts or token usage from unrecognized devices or locations. 5) Conduct security awareness training to inform users about the risks of using vulnerable applications and recognizing potential phishing or account compromise indicators. 6) Regularly audit and revoke suspicious OAuth tokens via Google account security settings. 7) Collaborate with Mobile Dynamix to obtain updates or patches and prioritize their deployment once available. 8) Consider alternative secure printing solutions that do not expose authentication tokens or have a better security track record. These measures go beyond generic advice by focusing on token management, network controls, and user behavior specific to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
KoreLogic
Date Reserved
2025-05-22T20:52:23.955Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682fd4b90acd01a249270948

Added to database: 5/23/2025, 1:51:53 AM

Last enriched: 7/8/2025, 4:27:20 AM

Last updated: 8/12/2025, 12:18:32 PM

Views: 19

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats