CVE-2025-5098: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Mobile Dynamix PrinterShare Mobile Print
PrinterShare Android application allows the capture of Gmail authentication tokens that can be reused to access a user's Gmail account without proper authorization.
AI Analysis
Technical Summary
CVE-2025-5098 is a critical security vulnerability identified in the PrinterShare Mobile Print Android application developed by Mobile Dynamix, specifically affecting version 12.15.01. This vulnerability involves the unauthorized exposure of sensitive information, namely Gmail authentication tokens, which can be captured by an attacker. These tokens, once obtained, allow the attacker to access the victim's Gmail account without proper authorization, bypassing normal authentication mechanisms. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) and CWE-313 (Cleartext Storage of Sensitive Information), indicating that sensitive data is either improperly protected or exposed in a manner accessible to unauthorized parties. The CVSS 3.1 base score of 9.1 reflects the critical nature of this flaw, with an attack vector that is network-based (AV:N), requiring no privileges (PR:N) or user interaction (UI:N), and impacting confidentiality and integrity at a high level (C:H/I:H/A:N). The vulnerability does not affect availability but allows full compromise of Gmail account confidentiality and integrity. No known exploits are currently reported in the wild, and no patches have been published as of the vulnerability disclosure date (May 23, 2025). The lack of patch availability increases the urgency for mitigation and risk management. The vulnerability likely arises from insecure handling or storage of OAuth tokens or similar authentication credentials within the mobile app, enabling attackers to intercept or extract these tokens through network interception, local device compromise, or app-level flaws. This flaw poses a significant risk to users relying on PrinterShare Mobile Print for printing services, especially those who use Gmail accounts for authentication or email services integrated with the app.
Potential Impact
For European organizations, this vulnerability presents a severe risk to the confidentiality and integrity of corporate Gmail accounts, which are often used for sensitive communications, document sharing, and identity verification. Compromise of Gmail accounts can lead to unauthorized access to emails, sensitive attachments, and potentially other linked Google services such as Drive, Calendar, and Contacts. This can result in data breaches, intellectual property theft, spear-phishing campaigns, and lateral movement within corporate networks. The vulnerability's network-based exploitability and lack of required user interaction make it highly dangerous in environments where employees use PrinterShare Mobile Print on corporate or personal devices connected to enterprise networks. Given the widespread use of Gmail and Android devices in Europe, especially in sectors like finance, healthcare, and government, the potential impact includes regulatory non-compliance (e.g., GDPR violations due to data exposure), reputational damage, and financial losses. The absence of a patch increases the window of exposure, necessitating immediate compensating controls. Additionally, the vulnerability could be exploited by advanced persistent threat (APT) actors targeting European entities, leveraging the flaw to gain footholds or exfiltrate sensitive information.
Mitigation Recommendations
Immediate mitigation should focus on limiting the exposure of Gmail authentication tokens within the PrinterShare Mobile Print app environment. Organizations should: 1) Advise users to avoid using PrinterShare Mobile Print version 12.15.01 until a patch is released. 2) Monitor and restrict network traffic to and from the PrinterShare app using mobile device management (MDM) solutions, including blocking or inspecting traffic for suspicious token leakage. 3) Enforce multi-factor authentication (MFA) on all Gmail accounts to reduce the risk of token misuse. 4) Implement conditional access policies in Google Workspace to detect and block anomalous login attempts or token usage from unrecognized devices or locations. 5) Conduct security awareness training to inform users about the risks of using vulnerable applications and recognizing potential phishing or account compromise indicators. 6) Regularly audit and revoke suspicious OAuth tokens via Google account security settings. 7) Collaborate with Mobile Dynamix to obtain updates or patches and prioritize their deployment once available. 8) Consider alternative secure printing solutions that do not expose authentication tokens or have a better security track record. These measures go beyond generic advice by focusing on token management, network controls, and user behavior specific to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Ireland
CVE-2025-5098: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Mobile Dynamix PrinterShare Mobile Print
Description
PrinterShare Android application allows the capture of Gmail authentication tokens that can be reused to access a user's Gmail account without proper authorization.
AI-Powered Analysis
Technical Analysis
CVE-2025-5098 is a critical security vulnerability identified in the PrinterShare Mobile Print Android application developed by Mobile Dynamix, specifically affecting version 12.15.01. This vulnerability involves the unauthorized exposure of sensitive information, namely Gmail authentication tokens, which can be captured by an attacker. These tokens, once obtained, allow the attacker to access the victim's Gmail account without proper authorization, bypassing normal authentication mechanisms. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) and CWE-313 (Cleartext Storage of Sensitive Information), indicating that sensitive data is either improperly protected or exposed in a manner accessible to unauthorized parties. The CVSS 3.1 base score of 9.1 reflects the critical nature of this flaw, with an attack vector that is network-based (AV:N), requiring no privileges (PR:N) or user interaction (UI:N), and impacting confidentiality and integrity at a high level (C:H/I:H/A:N). The vulnerability does not affect availability but allows full compromise of Gmail account confidentiality and integrity. No known exploits are currently reported in the wild, and no patches have been published as of the vulnerability disclosure date (May 23, 2025). The lack of patch availability increases the urgency for mitigation and risk management. The vulnerability likely arises from insecure handling or storage of OAuth tokens or similar authentication credentials within the mobile app, enabling attackers to intercept or extract these tokens through network interception, local device compromise, or app-level flaws. This flaw poses a significant risk to users relying on PrinterShare Mobile Print for printing services, especially those who use Gmail accounts for authentication or email services integrated with the app.
Potential Impact
For European organizations, this vulnerability presents a severe risk to the confidentiality and integrity of corporate Gmail accounts, which are often used for sensitive communications, document sharing, and identity verification. Compromise of Gmail accounts can lead to unauthorized access to emails, sensitive attachments, and potentially other linked Google services such as Drive, Calendar, and Contacts. This can result in data breaches, intellectual property theft, spear-phishing campaigns, and lateral movement within corporate networks. The vulnerability's network-based exploitability and lack of required user interaction make it highly dangerous in environments where employees use PrinterShare Mobile Print on corporate or personal devices connected to enterprise networks. Given the widespread use of Gmail and Android devices in Europe, especially in sectors like finance, healthcare, and government, the potential impact includes regulatory non-compliance (e.g., GDPR violations due to data exposure), reputational damage, and financial losses. The absence of a patch increases the window of exposure, necessitating immediate compensating controls. Additionally, the vulnerability could be exploited by advanced persistent threat (APT) actors targeting European entities, leveraging the flaw to gain footholds or exfiltrate sensitive information.
Mitigation Recommendations
Immediate mitigation should focus on limiting the exposure of Gmail authentication tokens within the PrinterShare Mobile Print app environment. Organizations should: 1) Advise users to avoid using PrinterShare Mobile Print version 12.15.01 until a patch is released. 2) Monitor and restrict network traffic to and from the PrinterShare app using mobile device management (MDM) solutions, including blocking or inspecting traffic for suspicious token leakage. 3) Enforce multi-factor authentication (MFA) on all Gmail accounts to reduce the risk of token misuse. 4) Implement conditional access policies in Google Workspace to detect and block anomalous login attempts or token usage from unrecognized devices or locations. 5) Conduct security awareness training to inform users about the risks of using vulnerable applications and recognizing potential phishing or account compromise indicators. 6) Regularly audit and revoke suspicious OAuth tokens via Google account security settings. 7) Collaborate with Mobile Dynamix to obtain updates or patches and prioritize their deployment once available. 8) Consider alternative secure printing solutions that do not expose authentication tokens or have a better security track record. These measures go beyond generic advice by focusing on token management, network controls, and user behavior specific to this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- KoreLogic
- Date Reserved
- 2025-05-22T20:52:23.955Z
- Cisa Enriched
- false
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682fd4b90acd01a249270948
Added to database: 5/23/2025, 1:51:53 AM
Last enriched: 7/8/2025, 4:27:20 AM
Last updated: 8/12/2025, 12:18:32 PM
Views: 19
Related Threats
CVE-2025-49895: CWE-352 Cross-Site Request Forgery (CSRF) in iThemes ServerBuddy by PluginBuddy.com
HighCVE-2025-55284: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in anthropics claude-code
HighCVE-2025-55286: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in vancluever z2d
HighCVE-2025-52621: CWE-346 Origin Validation Error in HCL Software BigFix SaaS Remediate
MediumCVE-2025-52620: CWE-20 Improper Input Validation in HCL Software BigFix SaaS Remediate
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.