CVE-2025-59403: n/a
The Flock Safety Android Collins application (aka com.flocksafety.android.collins) 6.35.31 for Android lacks authentication. It is responsible for the camera feed on Falcon, Sparrow, and Bravo devices, but exposes administrative API endpoints on port 8080 without authentication. Endpoints include but are not limited to: /reboot, /logs, /crashpack, and /adb/enable. This results in multiple impacts including denial of service (DoS) via /reboot, information disclosure via /logs, and remote code execution (RCE) via /adb/enable. The latter specifically results in adb being started over TCP without debugging confirmation, providing an attacker in the LAN/WLAN with shell access.
AI Analysis
Technical Summary
CVE-2025-59403 is a critical vulnerability affecting the Flock Safety Android Collins application (com.flocksafety.android.collins) version 6.35.31, which manages camera feeds for Falcon, Sparrow, and Bravo devices. The core issue is the lack of authentication on administrative API endpoints exposed on port 8080. These endpoints include /reboot, /logs, /crashpack, and /adb/enable, among others. Because these endpoints are accessible without any authentication, an attacker within the local area network (LAN) or wireless LAN (WLAN) can exploit them to perform multiple malicious actions. The /reboot endpoint can be used to cause denial of service (DoS) by repeatedly rebooting the device, disrupting surveillance operations. The /logs endpoint exposes sensitive information, leading to information disclosure that could aid further attacks. Most critically, the /adb/enable endpoint allows an attacker to start Android Debug Bridge (adb) over TCP without requiring debugging confirmation, effectively granting shell access to the device remotely. This enables remote code execution (RCE), allowing attackers to execute arbitrary commands, potentially compromising the device and the network it is connected to. The vulnerability arises from improper access control and insecure exposure of administrative interfaces, which are typically expected to be protected by authentication and network segmentation. No CVSS score has been assigned yet, and there are no known exploits in the wild as of the publication date. However, the nature of the vulnerability and the ease of exploitation within the LAN/WLAN environment make it a severe security risk.
Potential Impact
For European organizations, especially those relying on Flock Safety surveillance devices for security and monitoring, this vulnerability poses significant risks. The ability to remotely reboot devices can disrupt critical surveillance operations, potentially creating blind spots in security coverage. Information disclosure via logs can leak sensitive operational data or configuration details, facilitating further targeted attacks. The most severe impact is the potential for remote code execution through adb over TCP, which could allow attackers to gain persistent control over the devices, manipulate camera feeds, or pivot to other parts of the network. This could compromise physical security, violate privacy regulations such as GDPR due to unauthorized data access, and damage organizational reputation. Organizations in sectors like law enforcement, critical infrastructure, transportation, and urban security that deploy these devices are particularly vulnerable. The threat is exacerbated in environments where network segmentation is weak or where devices are accessible over WLAN or LAN without strict access controls. Given the administrative API is exposed without authentication, even relatively unsophisticated attackers with local network access can exploit this vulnerability, increasing the risk profile for European entities.
Mitigation Recommendations
Immediate mitigation should focus on network-level controls to restrict access to port 8080 on the affected devices. Organizations should implement strict network segmentation, ensuring that only authorized management stations can reach these endpoints. Deploy firewall rules or VLAN segmentation to isolate the devices from general user networks and guest WLANs. If possible, disable or block access to the administrative API endpoints until a vendor patch is available. Monitor network traffic for unusual activity targeting port 8080 or attempts to access the /adb/enable endpoint. Organizations should engage with Flock Safety to obtain patches or updated versions of the Android Collins application that enforce authentication on these endpoints. In the interim, consider deploying host-based intrusion detection systems (HIDS) on management workstations to detect suspicious adb connections. Additionally, enforce strong physical security controls to prevent unauthorized local network access. Regularly audit device configurations and logs to detect signs of exploitation. Finally, educate network administrators and security teams about this vulnerability to ensure rapid response if exploitation attempts are detected.
Affected Countries
United Kingdom, Germany, France, Netherlands, Belgium, Sweden, Italy, Spain
CVE-2025-59403: n/a
Description
The Flock Safety Android Collins application (aka com.flocksafety.android.collins) 6.35.31 for Android lacks authentication. It is responsible for the camera feed on Falcon, Sparrow, and Bravo devices, but exposes administrative API endpoints on port 8080 without authentication. Endpoints include but are not limited to: /reboot, /logs, /crashpack, and /adb/enable. This results in multiple impacts including denial of service (DoS) via /reboot, information disclosure via /logs, and remote code execution (RCE) via /adb/enable. The latter specifically results in adb being started over TCP without debugging confirmation, providing an attacker in the LAN/WLAN with shell access.
AI-Powered Analysis
Technical Analysis
CVE-2025-59403 is a critical vulnerability affecting the Flock Safety Android Collins application (com.flocksafety.android.collins) version 6.35.31, which manages camera feeds for Falcon, Sparrow, and Bravo devices. The core issue is the lack of authentication on administrative API endpoints exposed on port 8080. These endpoints include /reboot, /logs, /crashpack, and /adb/enable, among others. Because these endpoints are accessible without any authentication, an attacker within the local area network (LAN) or wireless LAN (WLAN) can exploit them to perform multiple malicious actions. The /reboot endpoint can be used to cause denial of service (DoS) by repeatedly rebooting the device, disrupting surveillance operations. The /logs endpoint exposes sensitive information, leading to information disclosure that could aid further attacks. Most critically, the /adb/enable endpoint allows an attacker to start Android Debug Bridge (adb) over TCP without requiring debugging confirmation, effectively granting shell access to the device remotely. This enables remote code execution (RCE), allowing attackers to execute arbitrary commands, potentially compromising the device and the network it is connected to. The vulnerability arises from improper access control and insecure exposure of administrative interfaces, which are typically expected to be protected by authentication and network segmentation. No CVSS score has been assigned yet, and there are no known exploits in the wild as of the publication date. However, the nature of the vulnerability and the ease of exploitation within the LAN/WLAN environment make it a severe security risk.
Potential Impact
For European organizations, especially those relying on Flock Safety surveillance devices for security and monitoring, this vulnerability poses significant risks. The ability to remotely reboot devices can disrupt critical surveillance operations, potentially creating blind spots in security coverage. Information disclosure via logs can leak sensitive operational data or configuration details, facilitating further targeted attacks. The most severe impact is the potential for remote code execution through adb over TCP, which could allow attackers to gain persistent control over the devices, manipulate camera feeds, or pivot to other parts of the network. This could compromise physical security, violate privacy regulations such as GDPR due to unauthorized data access, and damage organizational reputation. Organizations in sectors like law enforcement, critical infrastructure, transportation, and urban security that deploy these devices are particularly vulnerable. The threat is exacerbated in environments where network segmentation is weak or where devices are accessible over WLAN or LAN without strict access controls. Given the administrative API is exposed without authentication, even relatively unsophisticated attackers with local network access can exploit this vulnerability, increasing the risk profile for European entities.
Mitigation Recommendations
Immediate mitigation should focus on network-level controls to restrict access to port 8080 on the affected devices. Organizations should implement strict network segmentation, ensuring that only authorized management stations can reach these endpoints. Deploy firewall rules or VLAN segmentation to isolate the devices from general user networks and guest WLANs. If possible, disable or block access to the administrative API endpoints until a vendor patch is available. Monitor network traffic for unusual activity targeting port 8080 or attempts to access the /adb/enable endpoint. Organizations should engage with Flock Safety to obtain patches or updated versions of the Android Collins application that enforce authentication on these endpoints. In the interim, consider deploying host-based intrusion detection systems (HIDS) on management workstations to detect suspicious adb connections. Additionally, enforce strong physical security controls to prevent unauthorized local network access. Regularly audit device configurations and logs to detect signs of exploitation. Finally, educate network administrators and security teams about this vulnerability to ensure rapid response if exploitation attempts are detected.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-09-15T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68deb12af660c882cd1794a6
Added to database: 10/2/2025, 5:06:50 PM
Last enriched: 10/2/2025, 5:07:10 PM
Last updated: 10/2/2025, 9:39:05 PM
Views: 5
Related Threats
CVE-2025-61668: CWE-476: NULL Pointer Dereference in plone volto
HighCVE-2025-61600: CWE-400: Uncontrolled Resource Consumption in stalwartlabs stalwart
HighCVE-2025-54086: Vulnerability in Absolute Security Secure Access
MediumCVE-2025-61603: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in LabRedesCefetRJ WeGIA
CriticalCVE-2025-61595: CWE-400: Uncontrolled Resource Consumption in MANTRA-Chain mantrachain
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.