CVE-2025-25329

5.5 MEDIUM

📋 TL;DR

This vulnerability in Tencent MicroVision iOS app allows attackers to access sensitive user information by tricking users into clicking a specially crafted link. It affects iOS users of Tencent MicroVision version 8.137.0. The vulnerability enables unauthorized access to potentially confidential user data stored within the application.

💻 Affected Systems

Products:
  • Tencent MicroVision
Versions: 8.137.0
Operating Systems: iOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects iOS version of the app. Requires user interaction (clicking a crafted link).

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could exfiltrate all sensitive user data accessible to the app, including personal information, authentication tokens, or private content, leading to identity theft, account compromise, or privacy violations.

🟠

Likely Case

Targeted attacks where users are tricked into clicking malicious links, resulting in limited sensitive data exposure for affected individuals.

🟢

If Mitigated

With proper link validation and input sanitization, the vulnerability would be prevented, and no data exposure would occur.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction but is technically simple once a malicious link is crafted.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

Check for updates in the iOS App Store. If an update is available, install it immediately. If no update is available, consider temporarily disabling or uninstalling the app until a fix is released.

🔧 Temporary Workarounds

Disable automatic link handling

ios

Configure iOS to prompt before opening links in apps

Settings > Safari > Open Links > Ask

Avoid clicking unknown links

all

User education to avoid clicking suspicious or unexpected links

🧯 If You Can't Patch

  • Uninstall Tencent MicroVision until a patched version is available
  • Use device-level security controls to restrict app permissions and network access

🔍 How to Verify

Check if Vulnerable:

Check app version in iOS Settings > General > iPhone Storage > Tencent MicroVision. If version is 8.137.0, the app is vulnerable.

Check Version:

Not applicable for iOS apps - check via Settings as described above

Verify Fix Applied:

Update the app through the App Store and verify the version is higher than 8.137.0.

📡 Detection & Monitoring

Log Indicators:

  • Unusual URL patterns in app logs
  • Unexpected data access patterns

Network Indicators:

  • Suspicious outbound connections following link clicks
  • Data exfiltration to unknown domains

SIEM Query:

Not applicable for mobile app vulnerabilities without enterprise logging

🔗 References

📤 Share & Export