CVE-2025-10718

5.3 MEDIUM

📋 TL;DR

This vulnerability in Ooma Office Business Phone App for Android allows improper export of application components, potentially enabling local attackers to access sensitive functionality or data. It affects Android users running Ooma Office Business Phone App versions up to 7.2.2. The vulnerability requires local access to the device for exploitation.

💻 Affected Systems

Products:
  • Ooma Office Business Phone App
Versions: up to 7.2.2
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Android version of the Ooma Office Business Phone App. Requires local access to device for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with physical access to the device could exploit this to access sensitive business communications, call logs, or potentially intercept phone functionality.

🟠

Likely Case

Malicious apps on the same device could exploit this vulnerability to access Ooma app data or functionality without proper authorization.

🟢

If Mitigated

With proper app sandboxing and security controls, the impact would be limited to the Ooma app's data scope only.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploit details are publicly available on GitHub. Requires local access to device. Vendor was contacted but did not respond.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 7.2.2

Vendor Advisory: No vendor advisory available

Restart Required: No

Instructions:

1. Open Google Play Store 2. Search for Ooma Office Business Phone App 3. Check if update is available 4. Install latest version (above 7.2.2)

🔧 Temporary Workarounds

Disable app or restrict permissions

Android

Temporarily disable the Ooma app or restrict its permissions until patched

Settings > Apps > Ooma Office > Disable/Force Stop
Settings > Apps > Ooma Office > Permissions > Review and restrict

🧯 If You Can't Patch

  • Restrict physical access to devices running vulnerable app
  • Implement mobile device management (MDM) to control app installations and permissions

🔍 How to Verify

Check if Vulnerable:

Check app version in Settings > Apps > Ooma Office > App info. If version is 7.2.2 or lower, it's vulnerable.

Check Version:

adb shell dumpsys package com.ooma.office2 | grep versionName

Verify Fix Applied:

Update app via Play Store and verify version is above 7.2.2 in app settings.

📡 Detection & Monitoring

Log Indicators:

  • Unusual permission requests from Ooma app
  • Multiple failed component export attempts

Network Indicators:

  • None - this is a local vulnerability

SIEM Query:

app:"Ooma Office" AND version:"<=7.2.2" AND event_type:"permission_violation"

🔗 References

📤 Share & Export