Platform
android
Component
com.bluecats.bcreveal
Fixed in
3.0.20
CVE-2019-5626 affects BlueCats Reveal, an Android mobile application, prior to version 3.0.19. This vulnerability allows an attacker to access usernames and passwords stored in a cleartext file on the device. This can lead to unauthorized access and potential compromise of the BlueCats network implementation. Affected versions are those before 3.0.19, and the issue is resolved with an upgrade to version 3.0.19.
The primary impact of CVE-2019-5626 is the exposure of sensitive network credentials. An attacker who gains physical access to an Android device running a vulnerable version of BlueCats Reveal, or successfully installs a malicious application, can locate and extract this cleartext file. This allows them to authenticate to the BlueCats network, potentially gaining control over connected devices and accessing sensitive data managed by the network. The blast radius extends to any data or systems accessible through the compromised BlueCats network, depending on the network's configuration and permissions.
CVE-2019-5626 is not listed on the CISA KEV catalog. Public proof-of-concept exploits are not widely available, suggesting a low probability of active exploitation. The vulnerability was publicly disclosed on May 22, 2019. Given the requirement for physical device access, exploitation is likely to be targeted and opportunistic rather than widespread.
Exploit Status
EPSS
0.06% (18% percentile)
CVSS Vector
The primary mitigation for CVE-2019-5626 is to upgrade BlueCats Reveal to version 3.0.19 or later. This version addresses the cleartext storage issue. If immediate upgrading is not possible, consider implementing device access controls to limit physical access to devices running the vulnerable application. While a WAF or proxy cannot directly mitigate this vulnerability (as it's a local storage issue), enforcing strong device passcode policies and mobile device management (MDM) solutions can reduce the risk of unauthorized access. After upgrading, verify the fix by confirming that the credentials are no longer stored in cleartext on the device.
Actualice la aplicación BlueCats Reveal a la versión 3.0.19 o posterior desde la tienda de aplicaciones de Android. Esta versión corrige el almacenamiento inseguro de credenciales en texto plano. Si no puede actualizar inmediatamente, considere desinstalar la aplicación hasta que pueda instalar la versión corregida.
Vulnerability analysis and critical alerts directly to your inbox.
CVE-2019-5626 is a vulnerability in BlueCats Reveal versions before 3.0.19 that allows usernames and passwords to be stored in cleartext on Android devices, potentially leading to network compromise.
You are affected if you are using BlueCats Reveal versions prior to 3.0.19 on Android devices. Check your application version to determine your risk level.
Upgrade BlueCats Reveal to version 3.0.19 or later to resolve the cleartext storage issue. Implement device access controls as an interim measure.
There is no widespread evidence of active exploitation, but the vulnerability remains a risk if devices are not updated.
Refer to the BlueCats security advisory for details and further information: [https://www.bluecats.com/security-advisory/](https://www.bluecats.com/security-advisory/)
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.
Upload your build.gradle file and we'll tell you instantly if you're affected.