CVE-2025-57837: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Honor FCP-AN10
Tileservice module is affected by information leak vulnerability, successful exploitation of this vulnerability may affect service confidentiality.
AI Analysis
Technical Summary
CVE-2025-57837 is a vulnerability classified under CWE-200, indicating an exposure of sensitive information to unauthorized actors. It affects the Tileservice module of the Honor FCP-AN10 product, specifically version 8.0. The vulnerability allows an attacker to gain access to sensitive data that should otherwise remain confidential. The attack vector is local (AV:L), meaning the attacker must have physical or local network access to the device. The attack complexity is high (AC:H), suggesting that exploitation requires specific conditions or expertise. No privileges are required (PR:N), and no user interaction is needed (UI:N), which means that once local access is obtained, the attacker can exploit the vulnerability without further barriers. The scope is unchanged (S:U), so the impact is limited to the vulnerable component without affecting other system components. The confidentiality impact is low (C:L), indicating that only limited sensitive information may be exposed, with no impact on integrity or availability. The vulnerability was published on October 20, 2025, with no known exploits in the wild and no patches currently available. The lack of patches and exploits suggests that the vulnerability is newly discovered and not yet weaponized. The Tileservice module likely handles UI or system tile-related functions, and leaking information from this module could reveal system or user data that might aid further attacks or privacy breaches. Given the local access requirement and high complexity, the vulnerability poses a limited but real risk, especially in environments where devices are physically accessible or shared among multiple users.
Potential Impact
For European organizations, the primary impact of CVE-2025-57837 lies in the potential unauthorized disclosure of sensitive information from affected Honor FCP-AN10 devices. Although the confidentiality impact is low, exposure of any sensitive data can undermine privacy, compliance with data protection regulations such as GDPR, and organizational trust. The requirement for local access reduces the likelihood of remote exploitation but increases risk in scenarios involving shared workspaces, public access terminals, or insider threats. Organizations relying on Honor FCP-AN10 devices in critical infrastructure, government, or enterprise environments may face increased risk if attackers gain physical access. The vulnerability does not affect system integrity or availability, so operational disruption is unlikely. However, the leak of sensitive information could facilitate further targeted attacks or reconnaissance. The absence of known exploits reduces immediate risk but emphasizes the need for proactive mitigation. Overall, the impact is moderate for European organizations, primarily affecting confidentiality and compliance posture.
Mitigation Recommendations
To mitigate CVE-2025-57837 effectively, European organizations should implement the following specific measures: 1) Restrict physical and local network access to Honor FCP-AN10 devices by enforcing strict access controls, secure storage, and device usage policies. 2) Monitor and audit device usage logs to detect unusual local access patterns or attempts to access the Tileservice module. 3) Deploy endpoint protection solutions capable of detecting anomalous behavior related to local exploitation attempts. 4) Educate users and administrators about the risks of local device access and encourage reporting of suspicious activity. 5) Coordinate with Honor for timely patch releases and apply updates promptly once available. 6) Consider network segmentation to isolate vulnerable devices and limit lateral movement in case of compromise. 7) If possible, disable or restrict the Tileservice module functionality if it is not essential for operations. These targeted actions go beyond generic advice by focusing on controlling local access vectors and monitoring specific device behavior.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Poland, Netherlands
CVE-2025-57837: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Honor FCP-AN10
Description
Tileservice module is affected by information leak vulnerability, successful exploitation of this vulnerability may affect service confidentiality.
AI-Powered Analysis
Technical Analysis
CVE-2025-57837 is a vulnerability classified under CWE-200, indicating an exposure of sensitive information to unauthorized actors. It affects the Tileservice module of the Honor FCP-AN10 product, specifically version 8.0. The vulnerability allows an attacker to gain access to sensitive data that should otherwise remain confidential. The attack vector is local (AV:L), meaning the attacker must have physical or local network access to the device. The attack complexity is high (AC:H), suggesting that exploitation requires specific conditions or expertise. No privileges are required (PR:N), and no user interaction is needed (UI:N), which means that once local access is obtained, the attacker can exploit the vulnerability without further barriers. The scope is unchanged (S:U), so the impact is limited to the vulnerable component without affecting other system components. The confidentiality impact is low (C:L), indicating that only limited sensitive information may be exposed, with no impact on integrity or availability. The vulnerability was published on October 20, 2025, with no known exploits in the wild and no patches currently available. The lack of patches and exploits suggests that the vulnerability is newly discovered and not yet weaponized. The Tileservice module likely handles UI or system tile-related functions, and leaking information from this module could reveal system or user data that might aid further attacks or privacy breaches. Given the local access requirement and high complexity, the vulnerability poses a limited but real risk, especially in environments where devices are physically accessible or shared among multiple users.
Potential Impact
For European organizations, the primary impact of CVE-2025-57837 lies in the potential unauthorized disclosure of sensitive information from affected Honor FCP-AN10 devices. Although the confidentiality impact is low, exposure of any sensitive data can undermine privacy, compliance with data protection regulations such as GDPR, and organizational trust. The requirement for local access reduces the likelihood of remote exploitation but increases risk in scenarios involving shared workspaces, public access terminals, or insider threats. Organizations relying on Honor FCP-AN10 devices in critical infrastructure, government, or enterprise environments may face increased risk if attackers gain physical access. The vulnerability does not affect system integrity or availability, so operational disruption is unlikely. However, the leak of sensitive information could facilitate further targeted attacks or reconnaissance. The absence of known exploits reduces immediate risk but emphasizes the need for proactive mitigation. Overall, the impact is moderate for European organizations, primarily affecting confidentiality and compliance posture.
Mitigation Recommendations
To mitigate CVE-2025-57837 effectively, European organizations should implement the following specific measures: 1) Restrict physical and local network access to Honor FCP-AN10 devices by enforcing strict access controls, secure storage, and device usage policies. 2) Monitor and audit device usage logs to detect unusual local access patterns or attempts to access the Tileservice module. 3) Deploy endpoint protection solutions capable of detecting anomalous behavior related to local exploitation attempts. 4) Educate users and administrators about the risks of local device access and encourage reporting of suspicious activity. 5) Coordinate with Honor for timely patch releases and apply updates promptly once available. 6) Consider network segmentation to isolate vulnerable devices and limit lateral movement in case of compromise. 7) If possible, disable or restrict the Tileservice module functionality if it is not essential for operations. These targeted actions go beyond generic advice by focusing on controlling local access vectors and monitoring specific device behavior.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Honor
- Date Reserved
- 2025-08-21T03:17:26.137Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68f5f23f58c1f730f1d98293
Added to database: 10/20/2025, 8:26:39 AM
Last enriched: 10/20/2025, 8:41:42 AM
Last updated: 10/20/2025, 2:34:17 PM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-9671: Missing Authorization
MediumCVE-2025-11679: CWE-125 Out-of-bounds Read in warmcat libwebsockets
MediumCVE-2025-11680: CWE-787 Out-of-bounds Write in warmcat libwebsockets
MediumCVE-2025-11678: CWE-121 Stack-based Buffer Overflow in warmcat libwebsocket
HighCVE-2025-11677: CWE-416 Use After Free in warmcat libwebsockets
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.