CVE-2025-65832
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-10

Last updated on: 2025-12-12

Assigner: MITRE

Description
The mobile application insecurely handles information stored within memory. By performing a memory dump on the application after a user has logged out and terminated it, Wi-Fi credentials sent during the pairing process, JWTs used for authentication, and other sensitive details can be retrieved. As a result, an attacker with physical access to the device of a victim can retrieve this information and gain unauthorized access to their home Wi-Fi network and Meatmeet account.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-10
Last Modified
2025-12-12
Generated
2026-05-07
AI Q&A
2025-12-11
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
meatmeet meatmeet *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-316 The product stores sensitive information in cleartext in memory.
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, ensure that the mobile application securely handles sensitive information in memory by clearing or encrypting it immediately upon logout and termination. Additionally, restrict physical access to devices to prevent unauthorized memory dumps. Consider updating the application to a version that addresses this issue once available.


Can you explain this vulnerability to me?

This vulnerability occurs because the mobile application insecurely handles sensitive information stored in memory. After a user logs out and terminates the app, an attacker with physical access to the device can perform a memory dump to retrieve Wi-Fi credentials used during pairing, JWTs for authentication, and other sensitive data.


How can this vulnerability impact me? :

An attacker with physical access to your device can extract sensitive information such as your home Wi-Fi credentials and authentication tokens, potentially allowing unauthorized access to your home network and Meatmeet account.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart