We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A vulnerability classified as problematic has been found in Bharti Airtel Thanks App 4.105.4 on Android. Affected is an unknown function of the file /Android/data/com.myairtelapp/files/. The manipulation leads to cleartext storage in a file or on disk. It is possible to launch the attack on the physical device. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Es wurde eine problematische Schwachstelle in Bharti Airtel Thanks App 4.105.4 für Android entdeckt. Hiervon betroffen ist ein unbekannter Codeblock der Datei /Android/data/com.myairtelapp/files/. Durch das Manipulieren mit unbekannten Daten kann eine cleartext storage in a file or on disk-Schwachstelle ausgenutzt werden. Ein Angriff setzt physischen Zugriff auf dem Zielobjekt voraus. Der Exploit steht zur öffentlichen Verfügung.
Cleartext Storage in a File or on Disk
Cleartext Storage of Sensitive Information
2025-06-26: | Advisory disclosed |
2025-06-26: | VulDB entry created |
2025-06-26: | VulDB entry last update |
honest_corrupt (VulDB User)
vuldb.com/?id.314046 (VDB-314046 | Bharti Airtel Thanks App files cleartext storage in a file or on disk)
vuldb.com/?ctiid.314046 (VDB-314046 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.598122 (Submit #598122 | Airtel (Bharti Airtel Limited) Airtel Thanks App 4.105.4 Insecure Local Storage (OWASP Mobile Top 10: M2, M5))
github.com/...d-App-Insecure-Local-Storage-of-Sensitive-Data
drive.google.com/...tHeofoIDbWRH32z9rvA9jez/view?usp=sharing
Support options