CVE-2025-0590

7.5 HIGH

📋 TL;DR

This vulnerability in the CarlCare mobile application allows unauthorized access to sensitive information due to improper permission settings. It affects Android devices with the vulnerable CarlCare app installed, potentially exposing user data to malicious actors.

💻 Affected Systems

Products:
  • Transsion CarlCare mobile application
Versions: Specific vulnerable versions not publicly disclosed in references
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Transsion devices (Tecno, Infinix, Itel brands) and potentially other Android devices with CarlCare app installed. Exact version ranges not specified in provided references.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of sensitive user data including personal information, device details, and potentially authentication credentials stored by the CarlCare app.

🟠

Likely Case

Unauthorized access to app-specific data and device information that could be used for profiling, targeted attacks, or privacy violations.

🟢

If Mitigated

Limited exposure of non-sensitive app data with proper permission controls and security configurations in place.

🌐 Internet-Facing: LOW - This is primarily a local app vulnerability requiring physical or remote access to the device, not directly internet-facing.
🏢 Internal Only: MEDIUM - The risk exists on devices within an organization that have the vulnerable app installed, potentially exposing corporate data if the app has access to such information.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires access to the device and knowledge of the vulnerability. No public exploit code available based on provided references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in provided references

Vendor Advisory: https://security.tecno.com/SRC/securityUpdates

Restart Required: No

Instructions:

1. Check for CarlCare app updates in Google Play Store or device app store. 2. Install any available updates for CarlCare app. 3. Verify app permissions are properly configured after update.

🔧 Temporary Workarounds

Disable or Remove CarlCare App

Android

Uninstall or disable the CarlCare application if not required for device functionality

adb uninstall com.transsion.carlcare
Settings > Apps > CarlCare > Uninstall/Disable

Review and Restrict App Permissions

Android

Manually review and restrict unnecessary permissions granted to CarlCare app

Settings > Apps > CarlCare > Permissions > Review each permission

🧯 If You Can't Patch

  • Implement mobile device management (MDM) policies to restrict app installations and permissions
  • Monitor for unusual app behavior or data access patterns on affected devices

🔍 How to Verify

Check if Vulnerable:

Check CarlCare app version and compare against latest available version. Review app permissions for excessive access.

Check Version:

adb shell dumpsys package com.transsion.carlcare | grep versionName

Verify Fix Applied:

Verify CarlCare app is updated to latest version and permissions are appropriately restricted.

📡 Detection & Monitoring

Log Indicators:

  • Unusual permission requests from CarlCare app
  • Unexpected data access patterns by com.transsion.carlcare

Network Indicators:

  • Unexpected network traffic from CarlCare app to external servers

SIEM Query:

source="android_logs" AND process="com.transsion.carlcare" AND (event="permission_granted" OR event="data_access")

🔗 References

📤 Share & Export