CVE-2025-21615

5.5 MEDIUM

📋 TL;DR

CVE-2025-21615 allows malicious apps on the same Android device to exfiltrate sensitive GPS tracking data from the AAT (Another Activity Tracker) application. This affects all users running AAT versions below 1.26 on Android devices with other potentially malicious applications installed.

💻 Affected Systems

Products:
  • AAT (Another Activity Tracker)
Versions: All versions below v1.26
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Android device with both vulnerable AAT version and malicious app installed. App sandboxing bypass is required for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete exfiltration of all stored GPS tracking data including routes, timestamps, and activity history, potentially revealing sensitive location patterns and personal routines.

🟠

Likely Case

Limited data exposure depending on what malicious apps target, potentially exposing recent activity routes and location history.

🟢

If Mitigated

No data exposure when running patched version or with proper Android app sandboxing controls in place.

🌐 Internet-Facing: LOW - The vulnerability requires local app-to-app access, not direct internet exposure.
🏢 Internal Only: MEDIUM - Risk exists on devices with both AAT and malicious apps installed, which is common on personal Android devices.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires developing or installing a malicious Android app that bypasses standard app sandboxing to access AAT's data storage.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v1.26

Vendor Advisory: https://github.com/bailuk/AAT/security/advisories/GHSA-pwpm-x58v-px5c

Restart Required: Yes

Instructions:

1. Open Google Play Store on Android device. 2. Search for 'AAT - Another Activity Tracker'. 3. If update is available, tap 'Update'. 4. Alternatively, download v1.26+ from GitHub releases. 5. Restart the AAT application after update.

🔧 Temporary Workarounds

Uninstall suspicious apps

android

Remove any untrusted or unnecessary applications from the device to reduce attack surface.

Disable AAT when not in use

android

Force stop the AAT application when not actively tracking activities to limit exposure window.

🧯 If You Can't Patch

  • Limit installation of new apps to only trusted sources (Google Play Store verified apps)
  • Regularly review and uninstall unused or suspicious applications from the device

🔍 How to Verify

Check if Vulnerable:

Open AAT app → Settings → About → Check version number. If version is below 1.26, you are vulnerable.

Check Version:

Not applicable - check via app interface on Android device

Verify Fix Applied:

After updating, verify version shows 1.26 or higher in AAT Settings → About section.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns to AAT data directories by other applications
  • Multiple failed permission requests from unknown apps

Network Indicators:

  • Unexpected outbound connections containing GPS coordinate data from non-AAT apps

SIEM Query:

Not applicable for typical mobile device scenarios

🔗 References

📤 Share & Export