CVE-2025-57837: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Honor FCP-AN10
CVE-2025-57837 is an information disclosure vulnerability in the Tileservice module of the Honor FCP-AN10 device running version 8. 0. The flaw allows unauthorized local attackers to access sensitive information, potentially compromising service confidentiality. The vulnerability has a low CVSS score of 2. 9 due to its limited attack vector (local access required), high attack complexity, and no impact on integrity or availability. No known exploits are currently reported in the wild. European organizations using this specific Honor device may face minor confidentiality risks if devices are physically or logically accessible by unauthorized users. Mitigation involves restricting local access, monitoring device usage, and applying vendor patches once available. Countries with higher Honor device adoption and strategic use of such devices in enterprise or government sectors are more likely to be affected. Overall, the threat is low severity but should be addressed to prevent potential data leaks in sensitive environments.
AI Analysis
Technical Summary
CVE-2025-57837 identifies a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) affecting the Tileservice module of the Honor FCP-AN10 product, specifically version 8.0. The Tileservice module is responsible for certain system-level functionalities, and the vulnerability allows unauthorized actors to leak sensitive information, impacting confidentiality. The CVSS 3.1 vector (AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N) indicates that the attack requires local access (AV:L), has high attack complexity (AC:H), does not require privileges (PR:N) or user interaction (UI:N), and only affects confidentiality (C:L) without impacting integrity or availability. The vulnerability was published on October 20, 2025, with no known exploits in the wild and no patches currently available. The lack of remote exploitation and the high complexity reduce the risk, but the exposure of sensitive information could still be leveraged in targeted attacks or combined with other vulnerabilities. The vulnerability's presence in a specific device model used in certain environments means that the threat surface is limited but relevant for organizations deploying these devices. The Tileservice module's exact nature is not fully detailed, but given its system-level role, leaked information could include configuration details or sensitive operational data.
Potential Impact
For European organizations, the primary impact is the potential unauthorized disclosure of sensitive information from affected Honor FCP-AN10 devices. This could lead to confidentiality breaches, especially in environments where these devices handle sensitive communications or data. Since exploitation requires local access and has high complexity, the risk is mainly from insider threats or attackers who have already gained some level of physical or logical access to the device. The lack of impact on integrity and availability means operational disruption is unlikely. However, leaked information could aid attackers in further reconnaissance or lateral movement within networks. Organizations in sectors such as government, telecommunications, or enterprises using Honor devices for critical functions may face increased risk. The overall impact is low but should not be ignored in high-security contexts.
Mitigation Recommendations
1. Restrict physical and logical access to Honor FCP-AN10 devices to trusted personnel only, minimizing the risk of local exploitation. 2. Monitor device usage and access logs to detect any unauthorized local access attempts. 3. Implement network segmentation to isolate devices and limit exposure if compromised. 4. Stay in contact with Honor for official patches or firmware updates addressing this vulnerability and apply them promptly once available. 5. Conduct regular security audits on devices to identify any unusual behavior or data leaks. 6. Educate staff about the risks of local device access and enforce strict access control policies. 7. Consider deploying endpoint detection and response (EDR) solutions capable of monitoring local device activities for suspicious actions related to Tileservice or similar modules.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Poland, Netherlands
CVE-2025-57837: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Honor FCP-AN10
Description
CVE-2025-57837 is an information disclosure vulnerability in the Tileservice module of the Honor FCP-AN10 device running version 8. 0. The flaw allows unauthorized local attackers to access sensitive information, potentially compromising service confidentiality. The vulnerability has a low CVSS score of 2. 9 due to its limited attack vector (local access required), high attack complexity, and no impact on integrity or availability. No known exploits are currently reported in the wild. European organizations using this specific Honor device may face minor confidentiality risks if devices are physically or logically accessible by unauthorized users. Mitigation involves restricting local access, monitoring device usage, and applying vendor patches once available. Countries with higher Honor device adoption and strategic use of such devices in enterprise or government sectors are more likely to be affected. Overall, the threat is low severity but should be addressed to prevent potential data leaks in sensitive environments.
AI-Powered Analysis
Technical Analysis
CVE-2025-57837 identifies a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) affecting the Tileservice module of the Honor FCP-AN10 product, specifically version 8.0. The Tileservice module is responsible for certain system-level functionalities, and the vulnerability allows unauthorized actors to leak sensitive information, impacting confidentiality. The CVSS 3.1 vector (AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N) indicates that the attack requires local access (AV:L), has high attack complexity (AC:H), does not require privileges (PR:N) or user interaction (UI:N), and only affects confidentiality (C:L) without impacting integrity or availability. The vulnerability was published on October 20, 2025, with no known exploits in the wild and no patches currently available. The lack of remote exploitation and the high complexity reduce the risk, but the exposure of sensitive information could still be leveraged in targeted attacks or combined with other vulnerabilities. The vulnerability's presence in a specific device model used in certain environments means that the threat surface is limited but relevant for organizations deploying these devices. The Tileservice module's exact nature is not fully detailed, but given its system-level role, leaked information could include configuration details or sensitive operational data.
Potential Impact
For European organizations, the primary impact is the potential unauthorized disclosure of sensitive information from affected Honor FCP-AN10 devices. This could lead to confidentiality breaches, especially in environments where these devices handle sensitive communications or data. Since exploitation requires local access and has high complexity, the risk is mainly from insider threats or attackers who have already gained some level of physical or logical access to the device. The lack of impact on integrity and availability means operational disruption is unlikely. However, leaked information could aid attackers in further reconnaissance or lateral movement within networks. Organizations in sectors such as government, telecommunications, or enterprises using Honor devices for critical functions may face increased risk. The overall impact is low but should not be ignored in high-security contexts.
Mitigation Recommendations
1. Restrict physical and logical access to Honor FCP-AN10 devices to trusted personnel only, minimizing the risk of local exploitation. 2. Monitor device usage and access logs to detect any unauthorized local access attempts. 3. Implement network segmentation to isolate devices and limit exposure if compromised. 4. Stay in contact with Honor for official patches or firmware updates addressing this vulnerability and apply them promptly once available. 5. Conduct regular security audits on devices to identify any unusual behavior or data leaks. 6. Educate staff about the risks of local device access and enforce strict access control policies. 7. Consider deploying endpoint detection and response (EDR) solutions capable of monitoring local device activities for suspicious actions related to Tileservice or similar modules.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Honor
- Date Reserved
- 2025-08-21T03:17:26.137Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68f5f23f58c1f730f1d98293
Added to database: 10/20/2025, 8:26:39 AM
Last enriched: 10/27/2025, 12:59:30 PM
Last updated: 12/2/2025, 11:13:49 AM
Views: 91
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13353: CWE-330 Use of Insufficiently Random Values in Cloudflare gokey
HighCVE-2025-13873: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in ObjectPlanet Opinio
MediumCVE-2025-13872: CWE-918 Server-Side Request Forgery (SSRF) in ObjectPlanet Opinio
LowCVE-2025-13871: CWE-352 Cross-Site Request Forgery (CSRF) in ObjectPlanet Opinio
LowCVE-2025-10971: CWE-922 Insecure Storage of Sensitive Information in FERMAX ELECTRÓNICA S.A.U MeetMe
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.