CVE-2025-9673

5.3 MEDIUM

πŸ“‹ TL;DR

This vulnerability in the Kakao Hey Kakao Android app allows improper export of application components via AndroidManifest.xml, potentially enabling local attackers to access sensitive app functionality. It affects Android users running the Hey Kakao app up to version 2.17.4. The exploit requires local access to the device.

πŸ’» Affected Systems

Products:
  • Kakao ν—€μ΄μΉ΄μΉ΄μ˜€ Hey Kakao App
Versions: up to 2.17.4
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Android version of the app. Requires local access to device.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

πŸ”’ Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

πŸ”΄

Worst Case

Local attackers could access sensitive app components, potentially leading to data theft, privilege escalation, or unauthorized actions within the app.

🟠

Likely Case

Malicious apps on the same device could interact with Hey Kakao components they shouldn't have access to, potentially extracting user data or performing unauthorized operations.

🟒

If Mitigated

With proper Android security controls and app isolation, impact would be limited to the app's sandbox with minimal data exposure.

🌐 Internet-Facing: LOW - Attack requires local device access, not remote exploitation.
🏒 Internal Only: MEDIUM - Local attacks possible if malicious apps are installed on the same device.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: βœ… No
Complexity: LOW

Exploit requires local access to device. Public proof-of-concept available in GitHub repository.

πŸ› οΈ Fix & Mitigation

βœ… Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Vendor did not respond to disclosure. Consider workarounds or alternative apps.

πŸ”§ Temporary Workarounds

Uninstall vulnerable app

android

Remove the Hey Kakao app from affected Android devices

adb uninstall com.kakao.i.connect

Restrict app permissions

android

Limit app permissions in Android settings to minimum required

🧯 If You Can't Patch

  • Isolate app on separate user profile or work profile
  • Monitor for suspicious app behavior using Android security tools

πŸ” How to Verify

Check if Vulnerable:

Check app version in Android Settings > Apps > Hey Kakao. If version is 2.17.4 or lower, app is vulnerable.

Check Version:

adb shell dumpsys package com.kakao.i.connect | grep versionName

Verify Fix Applied:

No fix available to verify. Consider app removal as verification.

πŸ“‘ Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to com.kakao.i.connect components in Android logs

Network Indicators:

  • Unusual local inter-app communication involving Hey Kakao

SIEM Query:

No standard SIEM query available for local Android app vulnerabilities

πŸ”— References

πŸ“€ Share & Export