CVE-2025-41458

5.5 MEDIUM

📋 TL;DR

This vulnerability allows local attackers to extract sensitive data from the Two App Studio Journey iOS app by accessing unencrypted database files in the app's filesystem. Users of the affected iOS app version are at risk of having their stored sensitive information exposed. The attack requires physical access to the device or exploitation of other vulnerabilities to gain filesystem access.

💻 Affected Systems

Products:
  • Two App Studio Journey
Versions: v5.5.9 for iOS
Operating Systems: iOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects iOS version of the app. Requires local filesystem access to exploit.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete exposure of all sensitive user data stored by the app, including potentially credentials, personal information, or private content, leading to identity theft, account compromise, or privacy violations.

🟠

Likely Case

Local attackers with device access can extract user data, potentially exposing personal information or app-specific sensitive content.

🟢

If Mitigated

With proper device security controls and app sandboxing, risk is limited to attackers who have already compromised the device's security.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to device filesystem. No authentication bypass needed once filesystem access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.cirosec.de/sa/sa-2025-005

Restart Required: No

Instructions:

1. Check for app updates in the App Store. 2. If update available, install the latest version. 3. If no update available, consider temporarily uninstalling the app until a fix is released.

🔧 Temporary Workarounds

Enable iOS Data Protection

ios

Ensure iOS Data Protection is enabled for the app to encrypt files at rest

Restrict Device Access

ios

Implement strict physical security controls and device passcode policies

🧯 If You Can't Patch

  • Uninstall the vulnerable app version until a fix is available
  • Implement mobile device management (MDM) to control app installation and enforce device encryption

🔍 How to Verify

Check if Vulnerable:

Check app version in iOS Settings > General > iPhone Storage > Two App Studio Journey. If version is 5.5.9, the app is vulnerable.

Check Version:

Not applicable for iOS apps - check through iOS Settings interface

Verify Fix Applied:

Update app through App Store and verify version is higher than 5.5.9. Check app developer's security advisory for confirmation of fix.

📡 Detection & Monitoring

Log Indicators:

  • Unusual filesystem access patterns to app data directories
  • Multiple failed authentication attempts followed by successful access

Network Indicators:

  • Not applicable - local filesystem vulnerability

SIEM Query:

Not applicable for local iOS app vulnerability

🔗 References

📤 Share & Export