Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-25834 | Telpo MDM 1.4.6 thru 1.4.9 for Android contains sensitive administrator credentials and MQTT server connection details (IP/port) that are stored in plaintext within log files on the device's external storage. This allows attackers with access to these logs to: 1. Authenticate to the MDM web platform to execute administrative operations (device shutdown/factory reset/software installation); 2. Connect to the MQTT server to intercept/publish device data. |
Tue, 09 Sep 2025 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Telpo
Telpo telpo Mdm |
|
| CPEs | cpe:2.3:a:telpo:telpo_mdm:*:*:*:*:*:android:*:* | |
| Vendors & Products |
Telpo
Telpo telpo Mdm |
Wed, 27 Aug 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-312 | |
| Metrics |
cvssV3_1
|
Wed, 27 Aug 2025 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Google
Google android |
|
| Vendors & Products |
Google
Google android |
Tue, 26 Aug 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Telpo MDM 1.4.6 thru 1.4.9 for Android contains sensitive administrator credentials and MQTT server connection details (IP/port) that are stored in plaintext within log files on the device's external storage. This allows attackers with access to these logs to: 1. Authenticate to the MDM web platform to execute administrative operations (device shutdown/factory reset/software installation); 2. Connect to the MQTT server to intercept/publish device data. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-08-27T14:05:54.639Z
Reserved: 2025-08-13T00:00:00.000Z
Link: CVE-2025-55443
Updated: 2025-08-27T14:05:00.491Z
Status : Analyzed
Published: 2025-08-26T20:15:40.940
Modified: 2025-09-09T18:54:53.273
Link: CVE-2025-55443
No data.
OpenCVE Enrichment
Updated: 2025-08-27T11:21:31Z
EUVD