CVE-2025-25758

7.5 HIGH

📋 TL;DR

This vulnerability in KukuFM Android app allows attackers to extract sensitive cleartext data from the app's backup files. It affects all users of KukuFM Android version 1.12.7 (11207) who have Android backup enabled on their devices.

💻 Affected Systems

Products:
  • KukuFM Android
Versions: v1.12.7 (11207)
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists when android:allowBackup="true" is set in AndroidManifest.xml, which is the default configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers with physical access to the device or malware with backup permissions can extract authentication tokens, personal data, payment information, and other sensitive cleartext data stored by the app.

🟠

Likely Case

Malicious apps with backup permissions or attackers with physical device access can extract user credentials, listening history, preferences, and other personal data stored in cleartext.

🟢

If Mitigated

With proper Android backup security controls and encryption, only authorized backup processes can access the data, limiting exposure.

🌐 Internet-Facing: LOW - This requires local access to backup files or backup system compromise.
🏢 Internal Only: MEDIUM - Malicious apps on the same device or physical access to backup storage can exploit this.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires backup system access or physical device access. No public exploit code identified in references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after v1.12.7 (11207)

Vendor Advisory: Not provided in references

Restart Required: No

Instructions:

1. Update KukuFM Android app to latest version from Google Play Store. 2. Verify android:allowBackup="false" or proper backup encryption is implemented in newer versions.

🔧 Temporary Workarounds

Disable Android backup for KukuFM

Android

Prevent the app from creating vulnerable backup files

adb shell bmgr backupnow com.kukufm.android
adb shell bmgr transport com.google.android.backup/.BackupTransportService

Enable Android backup encryption

Android

Ensure device backup encryption is enabled to protect backup data

adb shell settings put secure backup_transport android/com.android.internal.backup.LocalTransport
adb shell bmgr enable true

🧯 If You Can't Patch

  • Disable Android backup completely on affected devices
  • Implement mobile device management (MDM) to control backup permissions and monitor for suspicious backup activity

🔍 How to Verify

Check if Vulnerable:

Check AndroidManifest.xml for android:allowBackup="true" in KukuFM app package. Use: adb shell dumpsys package com.kukufm.android | grep allowBackup

Check Version:

adb shell dumpsys package com.kukufm.android | grep versionName

Verify Fix Applied:

Verify android:allowBackup="false" in updated app or check that backup files are encrypted. Use same command as above.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized backup operations
  • Multiple backup attempts from unknown sources
  • Backup size anomalies for KukuFM app

Network Indicators:

  • Unusual backup data transfers to unauthorized destinations
  • Backup traffic during non-scheduled times

SIEM Query:

source="android_backup" AND app="com.kukufm.android" AND (event="unauthorized_access" OR size>threshold)

🔗 References

📤 Share & Export