Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2025-9135
PUBLISHED
More InfoOfficial Page
Assigner-VulDB
Assigner Org ID-1af790b2-7ee1-4545-860a-a788eba489b5
View Known Exploited Vulnerability (KEV) details
Published At-19 Aug, 2025 | 11:02
Updated At-22 Aug, 2025 | 05:18
Rejected At-
▼CVE Numbering Authority (CNA)
Verkehrsauskunft Österreich SmartRide/cleVVVer/BusBahnBim AndroidManifest.xml improper export of android application components

A vulnerability was detected in Verkehrsauskunft Österreich SmartRide, cleVVVer and BusBahnBim up to 12.1.1(258). The impacted element is an unknown function of the file AndroidManifest.xml. The manipulation results in improper export of android application components. The attack must be initiated from a local position. The exploit is now public and may be used. Upgrading to version 12.1.2(259) is sufficient to resolve this issue. Upgrading the affected component is recommended. The vendor was contacted early and fixed the issue by "[r]emoving the task affinity of the app so it can't be copied".

Affected Products
Vendor
Verkehrsauskunft Österreich
Product
SmartRide
Versions
Affected
  • 12.1.1(258)
Unaffected
  • 12.1.2(259)
Vendor
Verkehrsauskunft Österreich
Product
cleVVVer
Versions
Affected
  • 12.1.1(258)
Unaffected
  • 12.1.2(259)
Vendor
Verkehrsauskunft Österreich
Product
BusBahnBim
Versions
Affected
  • 12.1.1(258)
Unaffected
  • 12.1.2(259)
Problem Types
TypeCWE IDDescription
CWECWE-926Improper Export of Android Application Components
Metrics
VersionBase scoreBase severityVector
4.04.8MEDIUM
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
3.15.3MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
3.05.3MEDIUM
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
2.04.3N/A
AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

reporter
fxizenta (VulDB User)
Timeline
EventDate
Countermeasure disclosed2025-07-22 00:00:00
Advisory disclosed2025-08-19 00:00:00
VulDB entry created2025-08-19 02:00:00
VulDB entry last update2025-08-22 07:22:37
Replaced By

Rejected Reason

References
HyperlinkResource
https://vuldb.com/?id.320515
vdb-entry
technical-description
https://vuldb.com/?ctiid.320515
signature
permissions-required
https://vuldb.com/?submit.615276
third-party-advisory
https://vuldb.com/?submit.615278
third-party-advisory
https://vuldb.com/?submit.628235
third-party-advisory
https://github.com/KMov-g/androidapps/blob/main/de.hafas.android.vvt.md
related
https://github.com/KMov-g/androidapps/blob/main/de.hafas.android.vvt.md#steps-to-reproduce
exploit
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/KMov-g/androidapps/blob/main/de.hafas.android.vvt.md
exploit
https://github.com/KMov-g/androidapps/blob/main/de.hafas.android.vvt.md#steps-to-reproduce
exploit
Details not found