CVE-2025-58781

4.8 MEDIUM

📋 TL;DR

The WTW-EAGLE mobile app fails to properly validate SSL/TLS server certificates, allowing man-in-the-middle attackers to intercept and decrypt encrypted communications. This affects users of the WTW-EAGLE app on both iOS and Android platforms when connecting to untrusted networks.

💻 Affected Systems

Products:
  • WTW-EAGLE mobile application
Versions: All versions prior to patch
Operating Systems: iOS, Android
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default app configuration on both platforms.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers on the same network could intercept sensitive user data including login credentials, personal information, and any data transmitted between the app and servers.

🟠

Likely Case

Attackers on public Wi-Fi networks could monitor user activity and potentially capture session tokens or sensitive information.

🟢

If Mitigated

With proper network segmentation and certificate pinning, the risk is reduced to only targeted attacks on specific users.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires attacker to be on same network as victim and capable of intercepting traffic.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check app store for latest version

Vendor Advisory: https://jvn.jp/en/jp/JVN89109713/

Restart Required: No

Instructions:

1. Open Apple App Store or Google Play Store. 2. Search for 'WTW-EAGLE'. 3. If update is available, tap 'Update'. 4. Launch updated app.

🔧 Temporary Workarounds

Use trusted networks only

all

Restrict app usage to trusted, secure networks to prevent MITM attacks

Enable VPN

all

Use a reputable VPN service to encrypt all network traffic

🧯 If You Can't Patch

  • Discontinue use of the app until patched
  • Use only on trusted, secure networks with proper certificate validation

🔍 How to Verify

Check if Vulnerable:

Check app version in settings; if not latest from app store, assume vulnerable

Check Version:

Open app → Settings → About or check in device app manager

Verify Fix Applied:

Update to latest version from official app store and verify proper certificate validation

📡 Detection & Monitoring

Log Indicators:

  • SSL/TLS certificate validation failures
  • unexpected certificate authorities

Network Indicators:

  • SSL/TLS interception attempts
  • unusual certificate chains

SIEM Query:

ssl.validation:failed AND app.name:"WTW-EAGLE"

🔗 References

📤 Share & Export