CVE-2025-11598

N/A Unknown

📋 TL;DR

The mObywatel iOS application fails to properly clear sensitive data from the App Switcher preview, allowing unauthorized users to view personal information from the last screen displayed before the app was minimized. This affects all iOS users of the vulnerable mObywatel app versions. The vulnerability persists even after the user logs out, as the App Switcher retains cached visual data.

💻 Affected Systems

Products:
  • mObywatel iOS application
Versions: All versions before 4.71.0
Operating Systems: iOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects iOS due to App Switcher behavior; Android is not vulnerable. The issue occurs when the app is minimized/switched away from without proper screen clearing.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with physical access to the device could view highly sensitive personal information (e.g., national ID numbers, addresses, financial data) without authentication, leading to identity theft or targeted attacks.

🟠

Likely Case

Casual observers (colleagues, family members) could inadvertently see personal details when the device is left unattended, resulting in privacy violations.

🟢

If Mitigated

With proper device security controls (passcodes, biometrics, auto-lock), the window for exploitation is reduced, but the vulnerability still exists if the device is unlocked.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires physical access to an unlocked device or ability to view the App Switcher. No special tools or technical skills needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.71.0

Vendor Advisory: https://info.mobywatel.gov.pl/

Restart Required: No

Instructions:

1. Open the App Store on your iOS device. 2. Search for 'mObywatel'. 3. Tap 'Update' to install version 4.71.0 or later. 4. No device restart required after update.

🔧 Temporary Workarounds

Manually clear App Switcher

all

Force close the mObywatel app from the App Switcher after each use to prevent cached screen data from being visible.

1. Double-click Home button or swipe up from bottom (depending on iOS version) to open App Switcher.
2. Swipe up on the mObywatel app preview to force close it.

Enable device auto-lock

all

Reduce exposure window by setting device to auto-lock quickly when inactive.

1. Go to Settings > Display & Brightness > Auto-Lock.
2. Set to 30 seconds or less.

🧯 If You Can't Patch

  • Enforce strict physical security policies for devices containing sensitive applications.
  • Train users to manually force close the app from App Switcher after each sensitive session.

🔍 How to Verify

Check if Vulnerable:

1. Open mObywatel app and navigate to a screen with personal information. 2. Minimize app using Home gesture/button. 3. Open App Switcher - if last screen is visible, device is vulnerable.

Check Version:

Open mObywatel app > Tap menu/settings > Look for version number (should be 4.71.0 or higher).

Verify Fix Applied:

After updating to 4.71.0+, repeat the check steps - App Switcher should show a blank/obscured screen instead of actual content.

📡 Detection & Monitoring

Log Indicators:

  • No specific log indicators as this is a local UI issue.

Network Indicators:

  • No network indicators as exploitation is local.

SIEM Query:

Not applicable - this is a client-side visual vulnerability without server-side logging.

🔗 References

📤 Share & Export