Telpo MDM 1.4.6 thru 1.4.9 for Android contains sensitive administrator credentials and MQTT server connection details (IP/port) that are stored in plaintext within log files on the device's external storage. This allows attackers with access to these logs to: 1. Authenticate to the MDM web platform to execute administrative operations (device shutdown/factory reset/software installation); 2. Connect to the MQTT server to intercept/publish device data.
References
| Link | Resource |
|---|---|
| https://gist.github.com/raiji1n/a2ce5dd46c312e3bd38b9b2446b95860 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-08-26 20:15
Updated : 2025-09-09 18:54
NVD link : CVE-2025-55443
Mitre link : CVE-2025-55443
CVE.ORG link : CVE-2025-55443
JSON object : View
Products Affected
telpo
- telpo_mdm
CWE
CWE-312
Cleartext Storage of Sensitive Information
