CVE-2025-9135: Improper Export of Android Application Components in Verkehrsauskunft Österreich SmartRide
A vulnerability was detected in Verkehrsauskunft Österreich SmartRide, cleVVVer and BusBahnBim up to 12.1.1(258). The impacted element is an unknown function of the file AndroidManifest.xml. The manipulation results in improper export of android application components. The attack must be initiated from a local position. The exploit is now public and may be used. Upgrading to version 12.1.2(259) is sufficient to resolve this issue. Upgrading the affected component is recommended.
AI Analysis
Technical Summary
CVE-2025-9135 is a medium-severity vulnerability affecting the Android application Verkehrsauskunft Österreich SmartRide, as well as related apps cleVVVer and BusBahnBim up to version 12.1.1(258). The root cause is an improper export of Android application components due to a misconfiguration or flaw in the AndroidManifest.xml file. This file defines the app's components and their accessibility to other apps or system processes. Improperly exported components can be accessed or invoked by unauthorized local applications, potentially leading to unauthorized information disclosure, privilege escalation, or manipulation of app behavior. The attack vector requires local access to the device, meaning an attacker must have physical or local software access to the device to exploit the vulnerability. No user interaction or elevated privileges are required beyond local access, and the vulnerability affects confidentiality, integrity, and availability to a limited extent. The CVSS 4.0 score is 4.8 (medium), reflecting low attack complexity but limited scope and impact. The vulnerability is resolved by upgrading to version 12.1.2(259), which corrects the manifest configuration to restrict component export. No known exploits are currently in the wild, but a public exploit exists, increasing the risk of exploitation. This vulnerability is significant for users of these specific transit-related Android apps, which are used for public transportation information and routing in Austria and potentially neighboring regions. The improper export could allow malicious local apps to interfere with or extract sensitive transit data or user information stored or processed by these apps.
Potential Impact
For European organizations, particularly those involved in public transportation, mobility services, or urban planning that rely on the Verkehrsauskunft Österreich SmartRide app or its related apps, this vulnerability poses a moderate risk. Exploitation could lead to unauthorized access to sensitive user data or manipulation of transit information, potentially disrupting service reliability or user trust. While the attack requires local device access, the widespread use of these apps in Austria and possibly adjacent countries means that compromised devices could be leveraged for targeted attacks or data harvesting. Organizations managing fleets, public transit infrastructure, or customer-facing mobility services could face reputational damage or operational disruptions if attackers exploit this flaw. Additionally, privacy regulations such as GDPR impose strict requirements on protecting user data, so any data leakage resulting from this vulnerability could lead to compliance issues and fines. The limited scope and local attack vector reduce the likelihood of large-scale remote exploitation, but insider threats or malware on user devices could still leverage this vulnerability.
Mitigation Recommendations
The primary mitigation is to upgrade all affected applications to version 12.1.2(259) or later, which addresses the improper export of components in the AndroidManifest.xml. Organizations should enforce app update policies to ensure users promptly install the patched version. Additionally, implement mobile device management (MDM) solutions to restrict installation of unauthorized apps that could exploit local vulnerabilities. Conduct regular security audits of app permissions and exported components to detect misconfigurations. Educate users on the risks of installing untrusted local applications and the importance of device security hygiene. For organizations distributing these apps internally or customizing them, perform thorough manifest reviews and penetration testing focused on component exposure. Monitoring device logs for suspicious inter-app communication attempts can help detect exploitation attempts. Finally, consider implementing runtime application self-protection (RASP) or enhanced sandboxing to limit the impact of local attacks on app components.
Affected Countries
Austria, Germany, Switzerland
CVE-2025-9135: Improper Export of Android Application Components in Verkehrsauskunft Österreich SmartRide
Description
A vulnerability was detected in Verkehrsauskunft Österreich SmartRide, cleVVVer and BusBahnBim up to 12.1.1(258). The impacted element is an unknown function of the file AndroidManifest.xml. The manipulation results in improper export of android application components. The attack must be initiated from a local position. The exploit is now public and may be used. Upgrading to version 12.1.2(259) is sufficient to resolve this issue. Upgrading the affected component is recommended.
AI-Powered Analysis
Technical Analysis
CVE-2025-9135 is a medium-severity vulnerability affecting the Android application Verkehrsauskunft Österreich SmartRide, as well as related apps cleVVVer and BusBahnBim up to version 12.1.1(258). The root cause is an improper export of Android application components due to a misconfiguration or flaw in the AndroidManifest.xml file. This file defines the app's components and their accessibility to other apps or system processes. Improperly exported components can be accessed or invoked by unauthorized local applications, potentially leading to unauthorized information disclosure, privilege escalation, or manipulation of app behavior. The attack vector requires local access to the device, meaning an attacker must have physical or local software access to the device to exploit the vulnerability. No user interaction or elevated privileges are required beyond local access, and the vulnerability affects confidentiality, integrity, and availability to a limited extent. The CVSS 4.0 score is 4.8 (medium), reflecting low attack complexity but limited scope and impact. The vulnerability is resolved by upgrading to version 12.1.2(259), which corrects the manifest configuration to restrict component export. No known exploits are currently in the wild, but a public exploit exists, increasing the risk of exploitation. This vulnerability is significant for users of these specific transit-related Android apps, which are used for public transportation information and routing in Austria and potentially neighboring regions. The improper export could allow malicious local apps to interfere with or extract sensitive transit data or user information stored or processed by these apps.
Potential Impact
For European organizations, particularly those involved in public transportation, mobility services, or urban planning that rely on the Verkehrsauskunft Österreich SmartRide app or its related apps, this vulnerability poses a moderate risk. Exploitation could lead to unauthorized access to sensitive user data or manipulation of transit information, potentially disrupting service reliability or user trust. While the attack requires local device access, the widespread use of these apps in Austria and possibly adjacent countries means that compromised devices could be leveraged for targeted attacks or data harvesting. Organizations managing fleets, public transit infrastructure, or customer-facing mobility services could face reputational damage or operational disruptions if attackers exploit this flaw. Additionally, privacy regulations such as GDPR impose strict requirements on protecting user data, so any data leakage resulting from this vulnerability could lead to compliance issues and fines. The limited scope and local attack vector reduce the likelihood of large-scale remote exploitation, but insider threats or malware on user devices could still leverage this vulnerability.
Mitigation Recommendations
The primary mitigation is to upgrade all affected applications to version 12.1.2(259) or later, which addresses the improper export of components in the AndroidManifest.xml. Organizations should enforce app update policies to ensure users promptly install the patched version. Additionally, implement mobile device management (MDM) solutions to restrict installation of unauthorized apps that could exploit local vulnerabilities. Conduct regular security audits of app permissions and exported components to detect misconfigurations. Educate users on the risks of installing untrusted local applications and the importance of device security hygiene. For organizations distributing these apps internally or customizing them, perform thorough manifest reviews and penetration testing focused on component exposure. Monitoring device logs for suspicious inter-app communication attempts can help detect exploitation attempts. Finally, consider implementing runtime application self-protection (RASP) or enhanced sandboxing to limit the impact of local attacks on app components.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-19T05:24:49.747Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68a45d58ad5a09ad00f6b52e
Added to database: 8/19/2025, 11:17:44 AM
Last enriched: 8/19/2025, 11:32:44 AM
Last updated: 8/20/2025, 12:35:27 AM
Views: 3
Related Threats
CVE-2025-8289: CWE-502 Deserialization of Untrusted Data in themeisle Redirection for Contact Form 7
HighCVE-2025-8145: CWE-502 Deserialization of Untrusted Data in themeisle Redirection for Contact Form 7
HighCVE-2025-8141: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in themeisle Redirection for Contact Form 7
HighCVE-2025-9132: Out of bounds write in Google Chrome
UnknownCVE-2025-9193: Open Redirect in TOTVS Portal Meu RH
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.