Skip to main content

CVE-2025-5346: CWE-926 Improper Export of Android Application Components in Bluebird kr.co.bluebird.android.bbsettings

Medium
VulnerabilityCVE-2025-5346cvecve-2025-5346cwe-926
Published: Thu Jul 17 2025 (07/17/2025, 12:45:56 UTC)
Source: CVE Database V5
Vendor/Project: Bluebird
Product: kr.co.bluebird.android.bbsettings

Description

Bluebird devices contain a pre-loaded barcode scanner application. This application exposes an unsecured broadcast receiver "kr.co.bluebird.android.bbsettings.BootReceiver". A local attacker can call the receiver to overwrite file containing ".json" keyword with default barcode config file. It is possible to overwrite file in any location due to lack of protection against path traversal in name of the file. This issue affects all versions before 1.3.3.

AI-Powered Analysis

AILast updated: 07/17/2025, 13:31:23 UTC

Technical Analysis

CVE-2025-5346 is a medium-severity vulnerability affecting the Bluebird Android application 'kr.co.bluebird.android.bbsettings', which is pre-installed on Bluebird barcode scanner devices. The vulnerability arises from an improperly secured broadcast receiver component named 'kr.co.bluebird.android.bbsettings.BootReceiver'. This receiver is exposed without adequate access controls, allowing a local attacker to invoke it and trigger a file overwrite operation. Specifically, the attacker can overwrite files containing the '.json' keyword, which are used as default barcode configuration files. Due to insufficient validation of file paths, the vulnerability permits path traversal attacks, enabling the attacker to overwrite arbitrary files anywhere on the device's filesystem. This can lead to unauthorized modification of configuration or system files, potentially disrupting device functionality or enabling further exploitation. The vulnerability affects all versions of the application prior to 1.3.3. The CVSS 4.0 base score is 5.1 (medium), reflecting that the attack vector is local (AV:L), requires low attack complexity (AC:L), no privileges (PR:N), no user interaction (UI:N), and no confidentiality, integrity, or availability impact directly, but with limited scope impact (SI:L). No known exploits are currently reported in the wild.

Potential Impact

For European organizations using Bluebird barcode scanner devices, particularly in sectors like logistics, retail, manufacturing, and healthcare where such devices are integral to operations, this vulnerability poses a risk of local privilege abuse or sabotage. An attacker with local access—such as an insider, contractor, or someone with temporary physical access—could exploit this flaw to overwrite critical configuration files, potentially causing device misconfiguration, operational disruption, or enabling further malicious activities. While the vulnerability does not directly allow remote exploitation or data exfiltration, the ability to modify device configuration files could lead to denial of service or undermine the integrity of scanned data, impacting supply chain accuracy and operational reliability. Given the specialized nature of the devices, the impact is more pronounced in environments where device availability and data integrity are critical. Additionally, compromised devices could be leveraged as footholds within secure facilities, increasing overall organizational risk.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Immediately update the 'kr.co.bluebird.android.bbsettings' application to version 1.3.3 or later where the vulnerability is patched. 2) Restrict physical and local access to Bluebird devices to trusted personnel only, enforcing strict access controls and monitoring. 3) Implement device usage policies that limit installation or execution of unauthorized applications that could exploit local vulnerabilities. 4) Use Mobile Device Management (MDM) solutions to monitor device integrity and detect unauthorized changes to configuration files. 5) Conduct regular audits of device configurations and logs to identify suspicious activities. 6) If patching is delayed, consider disabling or restricting the vulnerable broadcast receiver component via device configuration or custom security policies, if feasible. 7) Train staff on the importance of device security and the risks of local exploitation. These steps go beyond generic advice by focusing on access control, monitoring, and device management tailored to the operational context of Bluebird devices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
CERT-PL
Date Reserved
2025-05-30T06:40:16.684Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6878f79ba83201eaace5cfab

Added to database: 7/17/2025, 1:16:11 PM

Last enriched: 7/17/2025, 1:31:23 PM

Last updated: 8/29/2025, 4:44:59 PM

Views: 25

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats