Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65827: n/a

0
Critical
VulnerabilityCVE-2025-65827cvecve-2025-65827
Published: Wed Dec 10 2025 (12/10/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

The mobile application is configured to allow clear text traffic to all domains and communicates with an API server over HTTP. As a result, an adversary located "upstream" can intercept the traffic, inspect its contents, and modify the requests in transit. TThis may result in a total compromise of the user's account if the attacker intercepts a request with active authentication tokens or cracks the MD5 hash sent on login.

AI-Powered Analysis

AILast updated: 12/17/2025, 22:12:59 UTC

Technical Analysis

CVE-2025-65827 identifies a critical security vulnerability in a mobile application that permits cleartext HTTP traffic to all domains, including communication with its backend API server. This configuration flaw violates secure communication principles by allowing data to be transmitted without encryption, exposing sensitive information to interception by any adversary positioned upstream in the network path, such as on public Wi-Fi networks or compromised routers. The vulnerability specifically enables attackers to eavesdrop on authentication tokens transmitted in HTTP requests or to crack the MD5 hash used during login authentication. Since MD5 is a weak hashing algorithm vulnerable to collision and preimage attacks, an attacker can potentially reverse or guess the hash to obtain user credentials. The vulnerability requires no privileges or user interaction, making exploitation straightforward. The CVSS 3.1 score of 9.1 reflects the vulnerability's high impact on confidentiality and integrity, with no impact on availability. The vulnerability is categorized under CWE-319 (Cleartext Transmission of Sensitive Information). Although no exploits have been reported in the wild yet, the risk is significant given the ease of interception and the potential for total account compromise. The absence of patch links suggests that a fix has not yet been publicly released, emphasizing the urgency for developers and organizations to implement mitigations. This vulnerability highlights the critical importance of enforcing HTTPS-only communication, using strong cryptographic primitives, and securing authentication tokens against interception and replay attacks.

Potential Impact

For European organizations, the impact of CVE-2025-65827 can be severe. The interception and modification of unencrypted API traffic can lead to unauthorized access to user accounts, resulting in data breaches, identity theft, and potential financial fraud. Organizations in sectors such as banking, e-commerce, healthcare, and government services that rely on mobile applications for user authentication and sensitive data exchange are particularly vulnerable. The compromise of authentication tokens can allow attackers to impersonate users, access confidential information, and perform unauthorized transactions. Additionally, the use of MD5 hashing for login credentials increases the risk of credential cracking, further exacerbating the threat. The vulnerability undermines user trust and can lead to regulatory penalties under GDPR due to inadequate protection of personal data in transit. The lack of availability impact means services remain operational, but the integrity and confidentiality of user data are critically compromised. The threat is heightened in environments with widespread use of public or insecure networks, common in urban European settings and among mobile users.

Mitigation Recommendations

European organizations should immediately enforce HTTPS-only communication in their mobile applications by disabling cleartext traffic permissions in app configurations (e.g., Android Network Security Configuration or iOS App Transport Security). All API endpoints must support and enforce TLS with strong cipher suites. Replace the use of MD5 hashing with modern, secure algorithms such as bcrypt, Argon2, or SHA-256 combined with salting to protect stored credentials and transmitted hashes. Implement secure token management practices, including short-lived tokens, token binding, and secure storage on the client side to prevent interception and replay. Conduct thorough security testing and code reviews to ensure no fallback to HTTP or weak cryptographic primitives exist. Educate users about the risks of using public Wi-Fi and encourage the use of VPNs for sensitive transactions. Monitor network traffic for anomalies indicative of man-in-the-middle attacks. Finally, prepare for rapid patch deployment once official fixes become available and maintain an incident response plan tailored to account compromise scenarios.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6939dce9a97935729e774048

Added to database: 12/10/2025, 8:49:45 PM

Last enriched: 12/17/2025, 10:12:59 PM

Last updated: 2/7/2026, 9:48:02 AM

Views: 62

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats