CVE-2025-9097

5.3 MEDIUM

📋 TL;DR

This vulnerability in Euro Information CIC's Android banking app allows improper export of application components via AndroidManifest.xml manipulation. Attackers can exploit this to access sensitive app components on the local device. Only Android users of version 12.56.0 of this specific banking app are affected.

💻 Affected Systems

Products:
  • Euro Information CIC banque et compte en ligne App
Versions: 12.56.0
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the specific Android banking app from Euro Information CIC. Requires the vulnerable version to be installed.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access sensitive banking functionality or data stored within the app, potentially leading to financial fraud or data theft.

🟠

Likely Case

Local attackers could bypass intended security boundaries to access app components they shouldn't have permission to use.

🟢

If Mitigated

With proper Android security controls and app sandboxing, impact would be limited to the app's own data and functionality.

🌐 Internet-Facing: LOW - Exploitation requires local access to the device.
🏢 Internal Only: MEDIUM - Malicious apps or users with physical access could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploit details are publicly available on GitHub. Requires local access to the device and knowledge of Android app exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: UNKNOWN

Vendor Advisory: NONE

Restart Required: No

Instructions:

No official patch available. Vendor has not responded to disclosure. Users should check for app updates in Google Play Store.

🔧 Temporary Workarounds

Uninstall vulnerable app

android

Remove the vulnerable banking app from affected devices

adb uninstall com.cic_prod.bad

Restrict app permissions

android

Limit app permissions in Android settings to reduce attack surface

🧯 If You Can't Patch

  • Isolate affected devices from sensitive networks
  • Monitor for suspicious app behavior or unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check app version in Android settings > Apps > Euro Information CIC banque et compte en ligne. If version is 12.56.0, device is vulnerable.

Check Version:

adb shell dumpsys package com.cic_prod.bad | grep versionName

Verify Fix Applied:

Verify app has been updated to a version higher than 12.56.0 or has been removed from the device.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected access to app components
  • Permission violations in Android logs

Network Indicators:

  • Unusual banking app network activity from unexpected sources

SIEM Query:

app:"com.cic_prod.bad" AND version:"12.56.0" AND event_type:"permission_violation"

🔗 References

📤 Share & Export