Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

OPPO Clone Phone Weak WiFi Hotspot Exposes Sensitive Data

Posted on June 24, 2025June 24, 2025 By CWS

A essential safety vulnerability has been found in OPPO’s Clone Telephone characteristic that might expose delicate consumer information by means of inadequately secured WiFi hotspots. 

The vulnerability, designated CVE-2025-27387, impacts ColorOS 15.0.2 and earlier variations, presenting a high-severity danger with a CVSS rating of seven.4 out of 10. 

Safety researcher FlorianDraschbache recognized this flaw in Might 2025, prompting quick consideration from cybersecurity communities worldwide.

Abstract
1. OPPO Clone Telephone characteristic incorporates a high-severity safety flaw (CVE-2025-27387) that exposes delicate consumer information throughout file transfers.
2. The vulnerability stems from insufficient WPA passphrase safety on WiFi hotspots, permitting close by attackers to intercept private information like contacts, messages, and pictures with out requiring particular entry.
3. All ColorOS 15.0.2 and earlier variations are affected, placing hundreds of thousands of OPPO gadget customers susceptible to information publicity.
4. No patch timeline has been introduced – customers ought to keep away from Clone Telephone performance in untrusted environments till updates are launched.

Expose Knowledge by way of Weak Wi-Fi Passphrases

The vulnerability stems from OPPO Clone Telephone’s implementation of weak WPA passphrases as the only real safety mechanism for file switch operations. 

In keeping with the GitHub Advisory Database, the flaw is assessed underneath CWE-200 (Data Publicity), indicating improper restriction of data entry. 

The technical evaluation reveals an assault vector marked as “Adjoining” with low assault complexity, that means malicious actors inside WiFi vary can exploit this weak spot with out requiring particular privileges or consumer interplay.

The CVSS v3.1 base metrics element the vulnerability’s traits: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N. 

This vector signifies adjoining community entry (AV:A), low complexity (AC:L), no privileges required (PR:N), no consumer interplay wanted (UI:N), modified scope (S:C), and excessive confidentiality affect (C:H). 

The vulnerability permits unauthorized info disclosure throughout file switch operations between units utilizing OPPO’s Clone Telephone characteristic. 

When customers provoke information migration, the system creates a WiFi hotspot protected solely by weak authentication mechanisms, doubtlessly permitting close by attackers to intercept delicate private information, together with contacts, messages, pictures, and software information.

Threat FactorsDetailsAffected ProductsColorOS 15.0.2 and belowImpactInformation disclosure by way of weak WiFi hotspot passwords throughout file transfers;Exploit PrerequisitesAdjacent community entry (inside WiFi vary)- No particular privileges required- No consumer interplay needed- Low assault complexityCVSS 3.1 Score7.4 (Excessive)

OPPO revealed this advisory yesterday, emphasizing the urgency of addressing this safety hole. 

The excessive confidentiality affect score signifies that profitable exploitation might end in full publicity of transferred info. 

Organizations and particular person customers counting on OPPO units for delicate information administration face important privateness dangers, notably in environments with a number of WiFi-enabled units.

Whereas particular patch timelines stay undisclosed, customers ought to keep away from utilizing Clone Telephone performance in untrusted environments till safety updates are launched.

The GHSA ID GHSA-5fm5-q6q3-865x has been assigned for monitoring functions inside GitHub’s safety advisory system. 

Customers working ColorOS 15.0.2 and under ought to monitor official OPPO safety bulletins for firmware updates addressing this vulnerability and think about different safe file switch strategies for delicate information migration.

Are you from SOC/DFIR Groups! – Work together with malware within the sandbox and discover associated IOCs. – Request 14-day free trial

Cyber Security News Tags:Clone, Data, Exposes, Hotspot, OPPO, Phone, Sensitive, Weak, WiFi

Post navigation

Previous Post: Weaponized DMV-Themed Phishing Attacking U.S. Citizens to Harvest Personal and Financial Data
Next Post: Pro-Iranian Hacktivists Targeting US Networks Department of Homeland Security Warns

Related Posts

Earth Ammit Hackers Attacking Using New Tools to Attack Drones Used in Military Sectors Cyber Security News
New Crocodilus Malware That Gain Complete Control of Android Device Cyber Security News
Password Reset Poisoning Attack Allows Account Takeover Using the Password Reset Link Cyber Security News
Cisco IOS XE Wireless Controllers Vulnerability Enables Full Device Control for Attackers Cyber Security News
North Korean APT Hackers Attacking Ukrainian Government Agencies to Steal Login Credentials Cyber Security News
XenServer VM Tools for Windows Vulnerability Let Attackers Execute Arbitrary Code Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New U.S. Visa Rule Requires Applicants to Set Social Media Account Privacy to Public
  • New FileFix Attack Abuses Windows File Explorer to Execute Malicious Commands
  • Gonjeshke Darande Threat Actors Pose as Hacktivist Infiltrated Iranian Crypto Exchange
  • 2,000+ Devices Hacked Using Weaponized Social Security Statement Themes
  • Facebook, Netflix, Microsoft Hijacked to Insert Fake Phone Number

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • New U.S. Visa Rule Requires Applicants to Set Social Media Account Privacy to Public
  • New FileFix Attack Abuses Windows File Explorer to Execute Malicious Commands
  • Gonjeshke Darande Threat Actors Pose as Hacktivist Infiltrated Iranian Crypto Exchange
  • 2,000+ Devices Hacked Using Weaponized Social Security Statement Themes
  • Facebook, Netflix, Microsoft Hijacked to Insert Fake Phone Number

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News