Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9672: Improper Export of Android Application Components in Rejseplanen App

0
Medium
VulnerabilityCVE-2025-9672cvecve-2025-9672
Published: Fri Aug 29 2025 (08/29/2025, 20:02:06 UTC)
Source: CVE Database V5
Product: Rejseplanen App

Description

A security vulnerability has been detected in Rejseplanen App up to 8.2.2. Affected is an unknown function of the file AndroidManifest.xml of the component de.hafas.android.rejseplanen. The manipulation leads to improper export of android application components. The attack needs to be performed locally. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 09/05/2025, 20:38:16 UTC

Technical Analysis

CVE-2025-9672 is a medium-severity security vulnerability identified in the Rejseplanen Android application versions up to 8.2.2. The vulnerability arises from improper exportation of Android application components declared in the AndroidManifest.xml file within the component de.hafas.android.rejseplanen. Specifically, certain components (such as activities, services, broadcast receivers, or content providers) are incorrectly marked as exported, allowing other local applications or processes on the same device to interact with them without proper authorization. This misconfiguration can lead to unauthorized access or manipulation of app functionality or data. Exploitation requires local access to the device, meaning an attacker must have the ability to run code or apps on the same device as the vulnerable app. No user interaction or elevated privileges beyond local access are necessary, but the attacker must have at least limited privileges (PR:L). The vulnerability does not require network access or system-level privileges, limiting its attack surface. The CVSS 4.0 base score of 4.8 reflects a medium severity, considering the limited attack vector (local), low complexity, and partial impact on confidentiality, integrity, and availability. The vendor was notified but did not respond, and no patches or mitigations have been published yet. No known exploits are currently in the wild, but public disclosure of the exploit details increases the risk of future exploitation. The vulnerability could allow local attackers to leverage the improperly exported components to perform unauthorized actions within the app context, potentially leading to data leakage, unauthorized operations, or privilege escalation within the app's scope.

Potential Impact

For European organizations, especially those relying on the Rejseplanen app for public transportation planning and related services, this vulnerability could expose sensitive user data or disrupt service integrity if exploited. Although the attack requires local access, the widespread use of the app in Denmark and neighboring countries means that compromised or malicious apps installed on the same device could exploit this flaw. This could lead to unauthorized access to user travel information, personal data, or manipulation of app behavior, undermining user trust and potentially violating data protection regulations such as GDPR. Organizations that integrate or rely on Rejseplanen for employee travel or public transport coordination may face operational risks or reputational damage if user data is compromised. However, the limited attack vector and absence of remote exploitation reduce the likelihood of large-scale attacks. The lack of vendor response and patches increases the urgency for organizations to implement compensating controls to mitigate risk.

Mitigation Recommendations

Given the absence of official patches, European organizations and users should take specific steps to mitigate this vulnerability: 1) Restrict installation of untrusted or unknown applications on devices running Rejseplanen to reduce the risk of local exploitation. 2) Employ mobile device management (MDM) solutions to enforce application whitelisting and control app permissions, limiting the ability of malicious apps to interact with Rejseplanen components. 3) Monitor device activity for unusual inter-app communication or behavior indicative of exploitation attempts. 4) Educate users about the risks of installing apps from unverified sources and the importance of device security hygiene. 5) Where possible, isolate or sandbox the Rejseplanen app environment to prevent unauthorized component access. 6) Regularly check for vendor updates or patches and apply them promptly once available. 7) Consider alternative transportation apps with better security postures if risk tolerance is low. These measures go beyond generic advice by focusing on controlling local app interactions and device-level security to compensate for the vulnerability's local attack vector.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-29T10:13:14.563Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68b20afbad5a09ad007ade2e

Added to database: 8/29/2025, 8:18:03 PM

Last enriched: 9/5/2025, 8:38:16 PM

Last updated: 10/14/2025, 12:29:25 PM

Views: 43

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats