CVE-2025-5346: CWE-926 Improper Export of Android Application Components in Bluebird kr.co.bluebird.android.bbsettings
Bluebird devices contain a pre-loaded barcode scanner application. This application exposes an unsecured broadcast receiver "kr.co.bluebird.android.bbsettings.BootReceiver". A local attacker can call the receiver to overwrite file containing ".json" keyword with default barcode config file. It is possible to overwrite file in any location due to lack of protection against path traversal in name of the file. This issue affects all versions before 1.3.3.
AI Analysis
Technical Summary
CVE-2025-5346 is a medium-severity vulnerability affecting the Bluebird Android application 'kr.co.bluebird.android.bbsettings', which is pre-installed on Bluebird barcode scanner devices. The vulnerability arises from an improperly secured broadcast receiver component named 'kr.co.bluebird.android.bbsettings.BootReceiver'. This receiver is exposed without adequate access controls, allowing a local attacker to invoke it and trigger a file overwrite operation. Specifically, the attacker can overwrite files containing the '.json' keyword, which are used as default barcode configuration files. Due to insufficient validation of file paths, the vulnerability permits path traversal attacks, enabling the attacker to overwrite arbitrary files anywhere on the device's filesystem. This can lead to unauthorized modification of configuration or system files, potentially disrupting device functionality or enabling further exploitation. The vulnerability affects all versions of the application prior to 1.3.3. The CVSS 4.0 base score is 5.1 (medium), reflecting that the attack vector is local (AV:L), requires low attack complexity (AC:L), no privileges (PR:N), no user interaction (UI:N), and no confidentiality, integrity, or availability impact directly, but with limited scope impact (SI:L). No known exploits are currently reported in the wild.
Potential Impact
For European organizations using Bluebird barcode scanner devices, particularly in sectors like logistics, retail, manufacturing, and healthcare where such devices are integral to operations, this vulnerability poses a risk of local privilege abuse or sabotage. An attacker with local access—such as an insider, contractor, or someone with temporary physical access—could exploit this flaw to overwrite critical configuration files, potentially causing device misconfiguration, operational disruption, or enabling further malicious activities. While the vulnerability does not directly allow remote exploitation or data exfiltration, the ability to modify device configuration files could lead to denial of service or undermine the integrity of scanned data, impacting supply chain accuracy and operational reliability. Given the specialized nature of the devices, the impact is more pronounced in environments where device availability and data integrity are critical. Additionally, compromised devices could be leveraged as footholds within secure facilities, increasing overall organizational risk.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately update the 'kr.co.bluebird.android.bbsettings' application to version 1.3.3 or later where the vulnerability is patched. 2) Restrict physical and local access to Bluebird devices to trusted personnel only, enforcing strict access controls and monitoring. 3) Implement device usage policies that limit installation or execution of unauthorized applications that could exploit local vulnerabilities. 4) Use Mobile Device Management (MDM) solutions to monitor device integrity and detect unauthorized changes to configuration files. 5) Conduct regular audits of device configurations and logs to identify suspicious activities. 6) If patching is delayed, consider disabling or restricting the vulnerable broadcast receiver component via device configuration or custom security policies, if feasible. 7) Train staff on the importance of device security and the risks of local exploitation. These steps go beyond generic advice by focusing on access control, monitoring, and device management tailored to the operational context of Bluebird devices.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium
CVE-2025-5346: CWE-926 Improper Export of Android Application Components in Bluebird kr.co.bluebird.android.bbsettings
Description
Bluebird devices contain a pre-loaded barcode scanner application. This application exposes an unsecured broadcast receiver "kr.co.bluebird.android.bbsettings.BootReceiver". A local attacker can call the receiver to overwrite file containing ".json" keyword with default barcode config file. It is possible to overwrite file in any location due to lack of protection against path traversal in name of the file. This issue affects all versions before 1.3.3.
AI-Powered Analysis
Technical Analysis
CVE-2025-5346 is a medium-severity vulnerability affecting the Bluebird Android application 'kr.co.bluebird.android.bbsettings', which is pre-installed on Bluebird barcode scanner devices. The vulnerability arises from an improperly secured broadcast receiver component named 'kr.co.bluebird.android.bbsettings.BootReceiver'. This receiver is exposed without adequate access controls, allowing a local attacker to invoke it and trigger a file overwrite operation. Specifically, the attacker can overwrite files containing the '.json' keyword, which are used as default barcode configuration files. Due to insufficient validation of file paths, the vulnerability permits path traversal attacks, enabling the attacker to overwrite arbitrary files anywhere on the device's filesystem. This can lead to unauthorized modification of configuration or system files, potentially disrupting device functionality or enabling further exploitation. The vulnerability affects all versions of the application prior to 1.3.3. The CVSS 4.0 base score is 5.1 (medium), reflecting that the attack vector is local (AV:L), requires low attack complexity (AC:L), no privileges (PR:N), no user interaction (UI:N), and no confidentiality, integrity, or availability impact directly, but with limited scope impact (SI:L). No known exploits are currently reported in the wild.
Potential Impact
For European organizations using Bluebird barcode scanner devices, particularly in sectors like logistics, retail, manufacturing, and healthcare where such devices are integral to operations, this vulnerability poses a risk of local privilege abuse or sabotage. An attacker with local access—such as an insider, contractor, or someone with temporary physical access—could exploit this flaw to overwrite critical configuration files, potentially causing device misconfiguration, operational disruption, or enabling further malicious activities. While the vulnerability does not directly allow remote exploitation or data exfiltration, the ability to modify device configuration files could lead to denial of service or undermine the integrity of scanned data, impacting supply chain accuracy and operational reliability. Given the specialized nature of the devices, the impact is more pronounced in environments where device availability and data integrity are critical. Additionally, compromised devices could be leveraged as footholds within secure facilities, increasing overall organizational risk.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately update the 'kr.co.bluebird.android.bbsettings' application to version 1.3.3 or later where the vulnerability is patched. 2) Restrict physical and local access to Bluebird devices to trusted personnel only, enforcing strict access controls and monitoring. 3) Implement device usage policies that limit installation or execution of unauthorized applications that could exploit local vulnerabilities. 4) Use Mobile Device Management (MDM) solutions to monitor device integrity and detect unauthorized changes to configuration files. 5) Conduct regular audits of device configurations and logs to identify suspicious activities. 6) If patching is delayed, consider disabling or restricting the vulnerable broadcast receiver component via device configuration or custom security policies, if feasible. 7) Train staff on the importance of device security and the risks of local exploitation. These steps go beyond generic advice by focusing on access control, monitoring, and device management tailored to the operational context of Bluebird devices.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- CERT-PL
- Date Reserved
- 2025-05-30T06:40:16.684Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6878f79ba83201eaace5cfab
Added to database: 7/17/2025, 1:16:11 PM
Last enriched: 7/17/2025, 1:31:23 PM
Last updated: 10/18/2025, 4:59:43 PM
Views: 57
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-47410: CWE-352 Cross-Site Request Forgery (CSRF) in Apache Software Foundation Apache Geode
UnknownCVE-2025-11926: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpdreams Related Posts Lite
MediumCVE-2025-9890: CWE-352 Cross-Site Request Forgery (CSRF) in mndpsingh287 Theme Editor
HighCVE-2025-5555: Stack-based Buffer Overflow in Nixdorf Wincor PORT IO Driver
HighCVE-2025-11256: CWE-285 Improper Authorization in kognetiks Kognetiks Chatbot
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.