Armis Logo< Back

CVE-2025-25983:

A vulnerability in Macro-video Technologies Co., Ltd V380 Pro Android app versions 2.1.44 and 2.1.64 allows an attacker to obtain sensitive information through the QE code-based sharing component.


Score
Info
A numerical rating that indicates how dangerous this vulnerability is.

3.4Low
  • Published Date:Apr 18, 2025
  • CISA KEV Date:*No Data*
  • Industries Affected:20

Threat Predictions

  • EPSS Score:0.2
  • EPSS Percentile:37%

Exploitability

  • Score:1.7
  • Attack Vector:NETWORK
  • Attack Complexity:LOW
  • Privileges Required:HIGH
  • User Interaction:REQUIRED
  • Scope:CHANGED

Impact

  • Score:1.4
  • Confidentiality Impact:LOW
  • Integrity Impact:NONE
  • Availability Impact:NONE

Description Preview

A vulnerability in Macro-video Technologies Co., Ltd V380 Pro Android app versions 2.1.44 and 2.1.64 allows an attacker to obtain sensitive information through the QE code-based sharing component.

Overview

An issue in Macro-video Technologies Co.,Ltd V380 Pro Android app 2.1.44 and V380 Pro Android app 2.1.64 allows an attacker to obtain sensitive information via the QE code-based sharing component. The underlying problems include storing passwords in a recoverable format (CWE-257) and an overreliance on obscurity for security (CWE-656). The vulnerability is exploitable over the network and requires user interaction, with high privileges needed for exploitation. The CVSS v3.1 base score is 3.4 (LOW), indicating a relatively modest overall risk but with potential sensitivity exposure for credential data.

Remediation

  • 1) Identify and apply patches or upgrade to a fixed version if provided by the vendor for the V380 Pro app, specifically addressing the QE code-based sharing component.
  • 2) Stop storing credentials in recoverable formats. Move to secure storage such as Android Keystore or encrypted storage and, where possible, replace password-based flows with short-lived tokens or server-side authentication tokens.
  • 3) Harden the QE code-based sharing component or disable it if it is not essential, and enforce strict access controls and authentication for any sharing functionality.
  • 4) Implement secure-by-default practices: encrypt data at rest and in transit (TLS), remove plaintext credential caches, and ensure credentials are never transmitted in cleartext or stored in reversible formats.
  • 5) Conduct secure code reviews and security testing (static/dynamic analysis, penetration testing) focused on credential handling and the sharing component; remediate any additional weaknesses found.
  • 6) Monitor for anomalous usage of the sharing feature and provide user advisories. If you are a developer or vendor, release a security advisory with remediation steps and timelines to affected users.

References

Industries Affected

Below is a list of industries most commonly impacted or potentially at risk based on intelligence.

Low
Mining icon
Mining
Utilities icon
Utilities
Information icon
Information
Construction icon
Construction
Retail Trade icon
Retail Trade
Manufacturing icon
Manufacturing
Wholesale Trade icon
Wholesale Trade
Educational Services icon
Educational Services
Finance and Insurance icon
Finance and Insurance
Public Administration icon
Public Administration
Real Estate Rental and Leasing icon
Real Estate Rental and Leasing
Transportation and Warehousing icon
Transportation and Warehousing
Accommodation and Food Services icon
Accommodation and Food Services
Health Care and Social Assistance icon
Health Care and Social Assistance
Arts, Entertainment, and Recreation icon
Arts, Entertainment, and Recreation
Management of Companies and Enterprises icon
Management of Companies and Enterprises
Agriculture, Forestry, Fishing and Hunting icon
Agriculture, Forestry, Fishing and Hunting
Other Services (except Public Administration) icon
Other Services (except Public Administration)
Professional, Scientific, and Technical Services icon
Professional, Scientific, and Technical Services
Administrative and Support and Waste Management and Remediation Services icon
Administrative and Support and Waste Management and Remediation Services

Focus on What Matters

See everything.Identify true risk.Proactively mitigate threats.Book a Demo

Let's talk!