CVE-2025-5719: CWE-306 Missing Authentication for Critical Function in vivo Wallet
The wallet has an authentication bypass vulnerability that allows access to specific pages.
AI Analysis
Technical Summary
CVE-2025-5719 is a medium-severity vulnerability identified in the vivo Wallet application, specifically affecting versions below 5.1.8.0. The vulnerability is categorized under CWE-306, which corresponds to Missing Authentication for Critical Function. This means that certain critical pages or functions within the vivo Wallet can be accessed without proper authentication controls. The CVSS 4.0 vector indicates the attack vector is physical (AV:P), with low attack complexity (AC:L), no privileges required (PR:N), but user interaction is required (UI:A). The vulnerability impacts confidentiality significantly (VC:H), but has no impact on integrity (VI:N) or availability (VA:N). The scope is limited (SC:L), and there is no impact on security or safety (SI:N, SA:N). Essentially, an attacker with physical access to the device and the ability to interact with the user interface can bypass authentication controls to access sensitive wallet pages. This could expose sensitive financial or personal data stored within the wallet application. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was published on June 6, 2025, and assigned by vivo. The lack of authentication on critical functions poses a risk of unauthorized access, potentially leading to data leakage or unauthorized transactions if the wallet supports such operations on the affected pages.
Potential Impact
For European organizations, especially those with employees or customers using vivo Wallet on their devices, this vulnerability could lead to unauthorized access to sensitive financial information or wallet functionalities. Given the physical attack vector, the risk is higher in environments where devices may be lost, stolen, or accessed by unauthorized personnel. Organizations handling sensitive financial transactions or personal data must consider the risk of data breaches or fraud resulting from this vulnerability. The impact on confidentiality is high, which could lead to regulatory compliance issues under GDPR if personal data is exposed. Additionally, organizations in sectors such as finance, retail, or mobile payment services that rely on vivo Wallet for transactions could face operational disruptions or reputational damage if this vulnerability is exploited. The medium severity indicates that while the vulnerability is not trivial, exploitation requires physical access and user interaction, somewhat limiting the attack surface but not eliminating the risk.
Mitigation Recommendations
1. Immediate mitigation should include upgrading all affected vivo Wallet instances to version 5.1.8.0 or later once the patch is released by vivo. 2. Until patches are available, organizations should enforce strict physical security controls to prevent unauthorized access to devices running the vulnerable wallet version. 3. Implement device-level authentication mechanisms such as strong PINs, biometrics, or full-disk encryption to reduce the risk of unauthorized physical access. 4. Educate users about the risks of leaving devices unattended and the importance of locking devices when not in use. 5. Monitor for unusual wallet activity or access patterns that could indicate exploitation attempts. 6. Consider disabling or restricting the use of vivo Wallet on corporate devices until the vulnerability is patched. 7. Coordinate with vivo support channels to receive timely updates and patches. 8. Conduct regular security audits and penetration testing focusing on mobile wallet applications to identify similar authentication weaknesses.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-5719: CWE-306 Missing Authentication for Critical Function in vivo Wallet
Description
The wallet has an authentication bypass vulnerability that allows access to specific pages.
AI-Powered Analysis
Technical Analysis
CVE-2025-5719 is a medium-severity vulnerability identified in the vivo Wallet application, specifically affecting versions below 5.1.8.0. The vulnerability is categorized under CWE-306, which corresponds to Missing Authentication for Critical Function. This means that certain critical pages or functions within the vivo Wallet can be accessed without proper authentication controls. The CVSS 4.0 vector indicates the attack vector is physical (AV:P), with low attack complexity (AC:L), no privileges required (PR:N), but user interaction is required (UI:A). The vulnerability impacts confidentiality significantly (VC:H), but has no impact on integrity (VI:N) or availability (VA:N). The scope is limited (SC:L), and there is no impact on security or safety (SI:N, SA:N). Essentially, an attacker with physical access to the device and the ability to interact with the user interface can bypass authentication controls to access sensitive wallet pages. This could expose sensitive financial or personal data stored within the wallet application. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was published on June 6, 2025, and assigned by vivo. The lack of authentication on critical functions poses a risk of unauthorized access, potentially leading to data leakage or unauthorized transactions if the wallet supports such operations on the affected pages.
Potential Impact
For European organizations, especially those with employees or customers using vivo Wallet on their devices, this vulnerability could lead to unauthorized access to sensitive financial information or wallet functionalities. Given the physical attack vector, the risk is higher in environments where devices may be lost, stolen, or accessed by unauthorized personnel. Organizations handling sensitive financial transactions or personal data must consider the risk of data breaches or fraud resulting from this vulnerability. The impact on confidentiality is high, which could lead to regulatory compliance issues under GDPR if personal data is exposed. Additionally, organizations in sectors such as finance, retail, or mobile payment services that rely on vivo Wallet for transactions could face operational disruptions or reputational damage if this vulnerability is exploited. The medium severity indicates that while the vulnerability is not trivial, exploitation requires physical access and user interaction, somewhat limiting the attack surface but not eliminating the risk.
Mitigation Recommendations
1. Immediate mitigation should include upgrading all affected vivo Wallet instances to version 5.1.8.0 or later once the patch is released by vivo. 2. Until patches are available, organizations should enforce strict physical security controls to prevent unauthorized access to devices running the vulnerable wallet version. 3. Implement device-level authentication mechanisms such as strong PINs, biometrics, or full-disk encryption to reduce the risk of unauthorized physical access. 4. Educate users about the risks of leaving devices unattended and the importance of locking devices when not in use. 5. Monitor for unusual wallet activity or access patterns that could indicate exploitation attempts. 6. Consider disabling or restricting the use of vivo Wallet on corporate devices until the vulnerability is patched. 7. Coordinate with vivo support channels to receive timely updates and patches. 8. Conduct regular security audits and penetration testing focusing on mobile wallet applications to identify similar authentication weaknesses.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Vivo
- Date Reserved
- 2025-06-05T07:16:07.160Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6842df031a426642debc957e
Added to database: 6/6/2025, 12:28:51 PM
Last enriched: 7/7/2025, 7:12:52 PM
Last updated: 8/7/2025, 6:34:41 AM
Views: 14
Related Threats
CVE-2025-54205: Out-of-bounds Read (CWE-125) in Adobe Substance3D - Sampler
MediumCVE-2025-54195: Out-of-bounds Read (CWE-125) in Adobe Substance3D - Painter
MediumCVE-2025-54194: Out-of-bounds Read (CWE-125) in Adobe Substance3D - Painter
MediumCVE-2025-54193: Out-of-bounds Read (CWE-125) in Adobe Substance3D - Painter
MediumCVE-2025-54192: Out-of-bounds Read (CWE-125) in Adobe Substance3D - Painter
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.