CVE-2025-5719: CWE-306 Missing Authentication for Critical Function in vivo Wallet
The wallet has an authentication bypass vulnerability that allows access to specific pages.
AI Analysis
Technical Summary
CVE-2025-5719 is a medium-severity vulnerability identified in the vivo Wallet application, specifically affecting versions below 5.1.8.0. The vulnerability is categorized under CWE-306, which corresponds to Missing Authentication for Critical Function. This means that certain critical pages or functions within the vivo Wallet can be accessed without proper authentication controls. The CVSS 4.0 vector indicates the attack vector is physical (AV:P), with low attack complexity (AC:L), no privileges required (PR:N), but user interaction is required (UI:A). The vulnerability impacts confidentiality significantly (VC:H), but has no impact on integrity (VI:N) or availability (VA:N). The scope is limited (SC:L), and there is no impact on security or safety (SI:N, SA:N). Essentially, an attacker with physical access to the device and the ability to interact with the user interface can bypass authentication controls to access sensitive wallet pages. This could expose sensitive financial or personal data stored within the wallet application. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was published on June 6, 2025, and assigned by vivo. The lack of authentication on critical functions poses a risk of unauthorized access, potentially leading to data leakage or unauthorized transactions if the wallet supports such operations on the affected pages.
Potential Impact
For European organizations, especially those with employees or customers using vivo Wallet on their devices, this vulnerability could lead to unauthorized access to sensitive financial information or wallet functionalities. Given the physical attack vector, the risk is higher in environments where devices may be lost, stolen, or accessed by unauthorized personnel. Organizations handling sensitive financial transactions or personal data must consider the risk of data breaches or fraud resulting from this vulnerability. The impact on confidentiality is high, which could lead to regulatory compliance issues under GDPR if personal data is exposed. Additionally, organizations in sectors such as finance, retail, or mobile payment services that rely on vivo Wallet for transactions could face operational disruptions or reputational damage if this vulnerability is exploited. The medium severity indicates that while the vulnerability is not trivial, exploitation requires physical access and user interaction, somewhat limiting the attack surface but not eliminating the risk.
Mitigation Recommendations
1. Immediate mitigation should include upgrading all affected vivo Wallet instances to version 5.1.8.0 or later once the patch is released by vivo. 2. Until patches are available, organizations should enforce strict physical security controls to prevent unauthorized access to devices running the vulnerable wallet version. 3. Implement device-level authentication mechanisms such as strong PINs, biometrics, or full-disk encryption to reduce the risk of unauthorized physical access. 4. Educate users about the risks of leaving devices unattended and the importance of locking devices when not in use. 5. Monitor for unusual wallet activity or access patterns that could indicate exploitation attempts. 6. Consider disabling or restricting the use of vivo Wallet on corporate devices until the vulnerability is patched. 7. Coordinate with vivo support channels to receive timely updates and patches. 8. Conduct regular security audits and penetration testing focusing on mobile wallet applications to identify similar authentication weaknesses.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-5719: CWE-306 Missing Authentication for Critical Function in vivo Wallet
Description
The wallet has an authentication bypass vulnerability that allows access to specific pages.
AI-Powered Analysis
Technical Analysis
CVE-2025-5719 is a medium-severity vulnerability identified in the vivo Wallet application, specifically affecting versions below 5.1.8.0. The vulnerability is categorized under CWE-306, which corresponds to Missing Authentication for Critical Function. This means that certain critical pages or functions within the vivo Wallet can be accessed without proper authentication controls. The CVSS 4.0 vector indicates the attack vector is physical (AV:P), with low attack complexity (AC:L), no privileges required (PR:N), but user interaction is required (UI:A). The vulnerability impacts confidentiality significantly (VC:H), but has no impact on integrity (VI:N) or availability (VA:N). The scope is limited (SC:L), and there is no impact on security or safety (SI:N, SA:N). Essentially, an attacker with physical access to the device and the ability to interact with the user interface can bypass authentication controls to access sensitive wallet pages. This could expose sensitive financial or personal data stored within the wallet application. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was published on June 6, 2025, and assigned by vivo. The lack of authentication on critical functions poses a risk of unauthorized access, potentially leading to data leakage or unauthorized transactions if the wallet supports such operations on the affected pages.
Potential Impact
For European organizations, especially those with employees or customers using vivo Wallet on their devices, this vulnerability could lead to unauthorized access to sensitive financial information or wallet functionalities. Given the physical attack vector, the risk is higher in environments where devices may be lost, stolen, or accessed by unauthorized personnel. Organizations handling sensitive financial transactions or personal data must consider the risk of data breaches or fraud resulting from this vulnerability. The impact on confidentiality is high, which could lead to regulatory compliance issues under GDPR if personal data is exposed. Additionally, organizations in sectors such as finance, retail, or mobile payment services that rely on vivo Wallet for transactions could face operational disruptions or reputational damage if this vulnerability is exploited. The medium severity indicates that while the vulnerability is not trivial, exploitation requires physical access and user interaction, somewhat limiting the attack surface but not eliminating the risk.
Mitigation Recommendations
1. Immediate mitigation should include upgrading all affected vivo Wallet instances to version 5.1.8.0 or later once the patch is released by vivo. 2. Until patches are available, organizations should enforce strict physical security controls to prevent unauthorized access to devices running the vulnerable wallet version. 3. Implement device-level authentication mechanisms such as strong PINs, biometrics, or full-disk encryption to reduce the risk of unauthorized physical access. 4. Educate users about the risks of leaving devices unattended and the importance of locking devices when not in use. 5. Monitor for unusual wallet activity or access patterns that could indicate exploitation attempts. 6. Consider disabling or restricting the use of vivo Wallet on corporate devices until the vulnerability is patched. 7. Coordinate with vivo support channels to receive timely updates and patches. 8. Conduct regular security audits and penetration testing focusing on mobile wallet applications to identify similar authentication weaknesses.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Vivo
- Date Reserved
- 2025-06-05T07:16:07.160Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6842df031a426642debc957e
Added to database: 6/6/2025, 12:28:51 PM
Last enriched: 7/7/2025, 7:12:52 PM
Last updated: 11/21/2025, 3:07:35 AM
Views: 32
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-64310: Improper restriction of excessive authentication attempts in SEIKO EPSON CORPORATION EPSON WebConfig for SEIKO EPSON Projector Products
CriticalCVE-2025-64762: CWE-524: Use of Cache Containing Sensitive Information in workos authkit-nextjs
HighCVE-2025-64755: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in anthropics claude-code
HighCVE-2025-62426: CWE-770: Allocation of Resources Without Limits or Throttling in vllm-project vllm
MediumCVE-2025-62372: CWE-129: Improper Validation of Array Index in vllm-project vllm
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.