Skip to main content

CVE-2025-5719: CWE-306 Missing Authentication for Critical Function in vivo Wallet

Medium
VulnerabilityCVE-2025-5719cvecve-2025-5719cwe-306
Published: Fri Jun 06 2025 (06/06/2025, 03:40:33 UTC)
Source: CVE Database V5
Vendor/Project: vivo
Product: Wallet

Description

The wallet has an authentication bypass vulnerability that allows access to specific pages.

AI-Powered Analysis

AILast updated: 07/07/2025, 19:12:52 UTC

Technical Analysis

CVE-2025-5719 is a medium-severity vulnerability identified in the vivo Wallet application, specifically affecting versions below 5.1.8.0. The vulnerability is categorized under CWE-306, which corresponds to Missing Authentication for Critical Function. This means that certain critical pages or functions within the vivo Wallet can be accessed without proper authentication controls. The CVSS 4.0 vector indicates the attack vector is physical (AV:P), with low attack complexity (AC:L), no privileges required (PR:N), but user interaction is required (UI:A). The vulnerability impacts confidentiality significantly (VC:H), but has no impact on integrity (VI:N) or availability (VA:N). The scope is limited (SC:L), and there is no impact on security or safety (SI:N, SA:N). Essentially, an attacker with physical access to the device and the ability to interact with the user interface can bypass authentication controls to access sensitive wallet pages. This could expose sensitive financial or personal data stored within the wallet application. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was published on June 6, 2025, and assigned by vivo. The lack of authentication on critical functions poses a risk of unauthorized access, potentially leading to data leakage or unauthorized transactions if the wallet supports such operations on the affected pages.

Potential Impact

For European organizations, especially those with employees or customers using vivo Wallet on their devices, this vulnerability could lead to unauthorized access to sensitive financial information or wallet functionalities. Given the physical attack vector, the risk is higher in environments where devices may be lost, stolen, or accessed by unauthorized personnel. Organizations handling sensitive financial transactions or personal data must consider the risk of data breaches or fraud resulting from this vulnerability. The impact on confidentiality is high, which could lead to regulatory compliance issues under GDPR if personal data is exposed. Additionally, organizations in sectors such as finance, retail, or mobile payment services that rely on vivo Wallet for transactions could face operational disruptions or reputational damage if this vulnerability is exploited. The medium severity indicates that while the vulnerability is not trivial, exploitation requires physical access and user interaction, somewhat limiting the attack surface but not eliminating the risk.

Mitigation Recommendations

1. Immediate mitigation should include upgrading all affected vivo Wallet instances to version 5.1.8.0 or later once the patch is released by vivo. 2. Until patches are available, organizations should enforce strict physical security controls to prevent unauthorized access to devices running the vulnerable wallet version. 3. Implement device-level authentication mechanisms such as strong PINs, biometrics, or full-disk encryption to reduce the risk of unauthorized physical access. 4. Educate users about the risks of leaving devices unattended and the importance of locking devices when not in use. 5. Monitor for unusual wallet activity or access patterns that could indicate exploitation attempts. 6. Consider disabling or restricting the use of vivo Wallet on corporate devices until the vulnerability is patched. 7. Coordinate with vivo support channels to receive timely updates and patches. 8. Conduct regular security audits and penetration testing focusing on mobile wallet applications to identify similar authentication weaknesses.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Vivo
Date Reserved
2025-06-05T07:16:07.160Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6842df031a426642debc957e

Added to database: 6/6/2025, 12:28:51 PM

Last enriched: 7/7/2025, 7:12:52 PM

Last updated: 8/7/2025, 6:34:41 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats