CVE-2025-50503

8.8 HIGH

📋 TL;DR

This vulnerability allows attackers to bypass the OTP verification in the password reset workflow of the Touch Lebanon Mobile App. Attackers can reset passwords and gain unauthorized access to user accounts without providing legitimate authentication factors. All users of the vulnerable app version are affected.

💻 Affected Systems

Products:
  • Touch Lebanon Mobile App
Versions: 2.20.2
Operating Systems: Android, iOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the mobile application, not web or backend systems directly.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete account takeover leading to unauthorized access to personal data, financial information, and potential identity theft or fraud.

🟠

Likely Case

Targeted account compromise allowing attackers to access user data, impersonate users, and potentially perform unauthorized transactions.

🟢

If Mitigated

Limited impact with proper monitoring and rapid response to suspicious password reset attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires knowledge of the target's username/email but no authentication. The GitHub disclosure includes technical details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.touch.com.lb/autoforms/portal/touch/personal/contentandapps/mobileapp

Restart Required: No

Instructions:

1. Monitor vendor website for security updates. 2. Update app through official app stores when patch is released. 3. No server-side patching required.

🔧 Temporary Workarounds

Disable password reset functionality

all

Temporarily disable password reset feature in app backend if possible

Implement rate limiting

all

Add rate limiting to password reset requests to prevent brute force attempts

🧯 If You Can't Patch

  • Monitor for suspicious password reset attempts and alert on multiple failed attempts
  • Implement additional authentication factors for sensitive account actions beyond password reset

🔍 How to Verify

Check if Vulnerable:

Check app version in settings. If version is 2.20.2, the app is vulnerable.

Check Version:

Check app version in mobile device settings under 'App Info' or 'About' section

Verify Fix Applied:

Verify app has been updated to a version higher than 2.20.2 through official app stores.

📡 Detection & Monitoring

Log Indicators:

  • Multiple password reset requests for same account
  • Password reset success without OTP verification
  • Unusual IP addresses performing password resets

Network Indicators:

  • HTTP requests to password reset endpoint without OTP parameter
  • Unusual patterns in authentication API calls

SIEM Query:

source="app_logs" AND (event="password_reset" AND NOT otp_verified="true")

🔗 References

📤 Share & Export