CVE-2025-14702

4.4 MEDIUM

📋 TL;DR

A path traversal vulnerability in Smartbit CommV Smartschool App allows attackers with local access to manipulate file paths through the be.smartschool.mobile.SplashActivity component. This could enable unauthorized file access or manipulation. Users of Smartschool App versions up to 10.4.4 are affected.

💻 Affected Systems

Products:
  • Smartbit CommV Smartschool App
Versions: Up to and including 10.4.4
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local access to the device; vulnerability is in the mobile application component.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains unauthorized access to sensitive files, potentially including configuration files, user data, or system files, leading to information disclosure or system compromise.

🟠

Likely Case

Local user exploits the vulnerability to access application files or configuration data they shouldn't have permission to view.

🟢

If Mitigated

With proper access controls and file permission restrictions, impact is limited to non-sensitive application files.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires local access to device; published exploit details available in references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Monitor vendor channels for updates to version 10.4.5 or later.

🔧 Temporary Workarounds

Restrict Local Access

all

Implement device access controls to limit who can physically access devices running the vulnerable app.

File Permission Hardening

linux

Set strict file permissions on application directories to limit what files can be accessed even if path traversal succeeds.

chmod 750 /path/to/smartschool/data
chown root:appgroup /path/to/smartschool/data

🧯 If You Can't Patch

  • Remove the application from devices until a patch is available
  • Implement application whitelisting to prevent unauthorized app execution

🔍 How to Verify

Check if Vulnerable:

Check app version in Android settings > Apps > Smartschool > App info. If version is 10.4.4 or lower, it's vulnerable.

Check Version:

adb shell dumpsys package be.smartschool.mobile | grep versionName

Verify Fix Applied:

Verify app version is higher than 10.4.4 after update from official app store.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns from Smartschool app
  • Path traversal strings in application logs

Network Indicators:

  • Local file access attempts from app to unexpected paths

SIEM Query:

source="android_logs" app="be.smartschool.mobile" (path="../" OR path="..\\")

🔗 References

📤 Share & Export