Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

OPPO Clone Phone Weak WiFi Hotspot Exposes Sensitive Data

Posted on June 24, 2025June 24, 2025 By CWS

A essential safety vulnerability has been found in OPPO’s Clone Telephone characteristic that might expose delicate consumer information by means of inadequately secured WiFi hotspots. 

The vulnerability, designated CVE-2025-27387, impacts ColorOS 15.0.2 and earlier variations, presenting a high-severity danger with a CVSS rating of seven.4 out of 10. 

Safety researcher FlorianDraschbache recognized this flaw in Might 2025, prompting quick consideration from cybersecurity communities worldwide.

Abstract
1. OPPO Clone Telephone characteristic incorporates a high-severity safety flaw (CVE-2025-27387) that exposes delicate consumer information throughout file transfers.
2. The vulnerability stems from insufficient WPA passphrase safety on WiFi hotspots, permitting close by attackers to intercept private information like contacts, messages, and pictures with out requiring particular entry.
3. All ColorOS 15.0.2 and earlier variations are affected, placing hundreds of thousands of OPPO gadget customers susceptible to information publicity.
4. No patch timeline has been introduced – customers ought to keep away from Clone Telephone performance in untrusted environments till updates are launched.

Expose Knowledge by way of Weak Wi-Fi Passphrases

The vulnerability stems from OPPO Clone Telephone’s implementation of weak WPA passphrases as the only real safety mechanism for file switch operations. 

In keeping with the GitHub Advisory Database, the flaw is assessed underneath CWE-200 (Data Publicity), indicating improper restriction of data entry. 

The technical evaluation reveals an assault vector marked as “Adjoining” with low assault complexity, that means malicious actors inside WiFi vary can exploit this weak spot with out requiring particular privileges or consumer interplay.

The CVSS v3.1 base metrics element the vulnerability’s traits: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N. 

This vector signifies adjoining community entry (AV:A), low complexity (AC:L), no privileges required (PR:N), no consumer interplay wanted (UI:N), modified scope (S:C), and excessive confidentiality affect (C:H). 

The vulnerability permits unauthorized info disclosure throughout file switch operations between units utilizing OPPO’s Clone Telephone characteristic. 

When customers provoke information migration, the system creates a WiFi hotspot protected solely by weak authentication mechanisms, doubtlessly permitting close by attackers to intercept delicate private information, together with contacts, messages, pictures, and software information.

Threat FactorsDetailsAffected ProductsColorOS 15.0.2 and belowImpactInformation disclosure by way of weak WiFi hotspot passwords throughout file transfers;Exploit PrerequisitesAdjacent community entry (inside WiFi vary)- No particular privileges required- No consumer interplay needed- Low assault complexityCVSS 3.1 Score7.4 (Excessive)

OPPO revealed this advisory yesterday, emphasizing the urgency of addressing this safety hole. 

The excessive confidentiality affect score signifies that profitable exploitation might end in full publicity of transferred info. 

Organizations and particular person customers counting on OPPO units for delicate information administration face important privateness dangers, notably in environments with a number of WiFi-enabled units.

Whereas particular patch timelines stay undisclosed, customers ought to keep away from utilizing Clone Telephone performance in untrusted environments till safety updates are launched.

The GHSA ID GHSA-5fm5-q6q3-865x has been assigned for monitoring functions inside GitHub’s safety advisory system. 

Customers working ColorOS 15.0.2 and under ought to monitor official OPPO safety bulletins for firmware updates addressing this vulnerability and think about different safe file switch strategies for delicate information migration.

Are you from SOC/DFIR Groups! – Work together with malware within the sandbox and discover associated IOCs. – Request 14-day free trial

Cyber Security News Tags:Clone, Data, Exposes, Hotspot, OPPO, Phone, Sensitive, Weak, WiFi

Post navigation

Previous Post: Weaponized DMV-Themed Phishing Attacking U.S. Citizens to Harvest Personal and Financial Data
Next Post: Pro-Iranian Hacktivists Targeting US Networks Department of Homeland Security Warns

Related Posts

PoC Exploit Released for Critical WebDAV 0-Day RCE Vulnerability Exploited by APT Hackers Cyber Security News
Windows 11 24H2 KASLR Broken Using an HVCI-Compatible Driver with Physical Memory Access Cyber Security News
Claude Vulnerabilities Let Attackers Execute Unauthorized Commands With its Own Help Cyber Security News
Managing Data Subject Access Requests in Compliance Programs Cyber Security News
D-Link 0-click Vulnerability Allows Remote Attackers to Crash the Server Cyber Security News
Microsoft Details Scattered Spider TTPs Observed in Recent Attack Chains Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New ‘Curly COMrades’ APT Hackers Attacking Targeting Critical Organizations in Countries
  • Hackers Could Gain Full Control of Your Rooted Android Devices by Exploiting One Vulnerability
  • Microsoft Office Vulnerabilities Let Attackers Execute Remote Code
  • New PS1Bot Malware Campaign Uses Malvertising to Deploy Multi-Stage In-Memory Attacks
  • New Multi-Stage Tycoon2FA Phishing Attack Now Beats Top Security Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New ‘Curly COMrades’ APT Hackers Attacking Targeting Critical Organizations in Countries
  • Hackers Could Gain Full Control of Your Rooted Android Devices by Exploiting One Vulnerability
  • Microsoft Office Vulnerabilities Let Attackers Execute Remote Code
  • New PS1Bot Malware Campaign Uses Malvertising to Deploy Multi-Stage In-Memory Attacks
  • New Multi-Stage Tycoon2FA Phishing Attack Now Beats Top Security Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News