First published: Tue Mar 11 2025(Updated: )
This vulnerability exists in the Tinxy smart devices due to storage of credentials in plaintext within the device firmware. An attacker with physical access could exploit this by extracting the firmware and analyzing the binary data to obtain the plaintext credentials stored on the vulnerable device.
Credit: vdisclose@cert-in.org.in
Affected Software | Affected Version | How to fix |
---|---|---|
Tinxy smart devices |
Apply mitigations as per vendor instructions (whenever available) or discontinue the use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-2189 is classified with a significant severity due to the risk of credential exposure in plaintext.
To mitigate CVE-2025-2189, ensure that firmware updates are applied that implement secure credential storage practices.
CVE-2025-2189 allows attackers with physical access to extract sensitive plaintext credentials from the device firmware.
CVE-2025-2189 affects all models of Tinxy smart devices utilizing firmware that stores credentials in plaintext.
Yes, an attacker must have physical access to the Tinxy smart device to exploit CVE-2025-2189 effectively.