CVE-2025-57197

6.0 MEDIUM

📋 TL;DR

An improper access control vulnerability in Payeer Android app 2.5.0 allows local attackers with root access to bypass PIN verification and change the authentication PIN without knowing the current PIN. This affects Payeer Android app users on rooted devices. The vulnerability enables unauthorized PIN modification through dynamic instrumentation of the app.

💻 Affected Systems

Products:
  • Payeer Android Application
Versions: 2.5.0
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects devices with root access. Standard non-rooted Android devices are not vulnerable to this specific attack vector.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with physical access to a rooted device could change the PIN, lock out the legitimate user, and gain unauthorized access to the Payeer account and funds.

🟠

Likely Case

Malicious apps or users with root privileges on compromised devices could change PINs to hijack Payeer accounts for fraudulent transactions.

🟢

If Mitigated

With proper device security (no root access, verified boot), the attack surface is significantly reduced as root access is required.

🌐 Internet-Facing: LOW - This is a local attack requiring root access to the device, not exploitable remotely over the internet.
🏢 Internal Only: MEDIUM - The risk exists on rooted devices where attackers have local access, but requires specific conditions (root + physical/privileged access).

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires root access to the device and ability to dynamically instrument the app (e.g., using Frida, Xposed). The technical details are documented in public references but no ready-to-use exploit code is published.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 2.5.0 (check latest version in Google Play Store)

Vendor Advisory: https://payeer.com

Restart Required: No

Instructions:

1. Open Google Play Store on Android device. 2. Search for 'Payeer'. 3. If update is available, tap 'Update'. 4. Ensure you're running the latest version. 5. Verify the app version in settings.

🔧 Temporary Workarounds

Disable Root Access

android

Remove root privileges from the device to prevent the attack vector

Varies by device - typically involves flashing stock firmware or using unroot tools

Use Device Security Features

android

Enable verified boot, device encryption, and app integrity checks

Settings > Security > Enable 'Verify apps'
Settings > Security > Enable encryption

🧯 If You Can't Patch

  • Avoid using Payeer app on rooted devices
  • Use Payeer web interface instead of mobile app on vulnerable devices

🔍 How to Verify

Check if Vulnerable:

Check if Payeer app version is 2.5.0 on a rooted Android device. The vulnerability exists in this specific version.

Check Version:

adb shell dumpsys package com.payeer.android | grep versionName

Verify Fix Applied:

Update to latest Payeer version from Google Play Store and verify version is greater than 2.5.0. Test PIN change functionality requires current PIN.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected PIN change events without prior successful authentication
  • Multiple failed PIN attempts followed by successful PIN change
  • App process instrumentation logs (if available)

Network Indicators:

  • PIN change API calls without preceding authentication API calls

SIEM Query:

source="android_logs" AND (event="pin_change" AND NOT preceding_event="pin_verify")

🔗 References

📤 Share & Export