Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64696: Use of cache containing sensitive information in Brother Industries, Ltd. Android App "Brother iPrint&Scan"

0
Low
VulnerabilityCVE-2025-64696cvecve-2025-64696
Published: Tue Dec 09 2025 (12/09/2025, 08:16:36 UTC)
Source: CVE Database V5
Vendor/Project: Brother Industries, Ltd.
Product: Android App "Brother iPrint&Scan"

Description

Android App "Brother iPrint&Scan" versions 6.13.7 and earlier improperly uses an external cache directory. If exploited, application-specific files may be accessed from other malicious applications.

AI-Powered Analysis

AILast updated: 12/09/2025, 08:48:52 UTC

Technical Analysis

CVE-2025-64696 identifies a security vulnerability in the Android application "Brother iPrint&Scan" developed by Brother Industries, Ltd. The affected versions, 6.13.7 and earlier, improperly utilize an external cache directory to store application-specific files. Android external cache directories are accessible by other applications with appropriate permissions, unlike internal app storage which is sandboxed. This misconfiguration can lead to unauthorized access where malicious applications installed on the same device can read sensitive cached data belonging to the Brother app. The vulnerability does not require elevated privileges but does require local access to the device and some user interaction, such as installing a malicious app. The impact is limited to confidentiality as the attacker can only read cached data; there is no impact on data integrity or application availability. The CVSS v3.0 score of 3.3 reflects a low severity due to the attack vector being local, low complexity, no privileges required, but requiring user interaction, and limited confidentiality impact. No known exploits are currently reported in the wild. This vulnerability highlights the risks of improper use of external storage on Android, which can expose sensitive information to other apps due to Android's shared storage model. The issue can be remediated by moving sensitive cache data to internal storage or using Android's scoped storage mechanisms introduced in recent OS versions.

Potential Impact

For European organizations, the primary impact is a potential confidentiality breach of sensitive information cached by the Brother iPrint&Scan app on employee Android devices. If a malicious app is installed on the same device, it could access cached files, potentially exposing print job details or user data related to printing and scanning operations. While the vulnerability does not affect data integrity or availability, the leakage of sensitive information could lead to privacy violations or indirect operational risks. Organizations with Bring Your Own Device (BYOD) policies or less controlled mobile environments are at higher risk. The impact is mitigated by the requirement for local device access and user interaction to install a malicious app. However, in environments where mobile device security hygiene is weak, this vulnerability could be exploited to gather intelligence or sensitive data. The low CVSS score indicates limited risk, but organizations handling sensitive documents should prioritize mitigation to prevent any data leakage.

Mitigation Recommendations

1. Update the Brother iPrint&Scan app to the latest version once Brother Industries releases a patch addressing this vulnerability. 2. Until a patch is available, restrict installation of untrusted or unknown applications on employee devices to reduce risk of malicious apps exploiting this vulnerability. 3. Enforce mobile device management (MDM) policies that limit app permissions, especially access to external storage and cache directories. 4. Educate users about the risks of installing apps from unverified sources and the importance of device security hygiene. 5. Consider disabling or restricting use of the Brother iPrint&Scan app on devices where sensitive information confidentiality is critical, or use alternative secure printing solutions. 6. Monitor devices for suspicious app installations or unusual access patterns to cached files. 7. Encourage use of Android OS versions with scoped storage enabled, which limits app access to external storage and reduces such risks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
jpcert
Date Reserved
2025-12-03T02:45:34.008Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 6937def0ca0f3871ecb2c5c8

Added to database: 12/9/2025, 8:33:52 AM

Last enriched: 12/9/2025, 8:48:52 AM

Last updated: 12/11/2025, 12:28:36 AM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats