{"vulnerability": "CVE-2025-20615", "sightings": [{"uuid": "e08c9f7a-d4ff-4f41-b948-7f3d31b4fda8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20615", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113998796638389534", "content": "", "creation_timestamp": "2025-02-13T21:53:11.831615Z"}, {"uuid": "2bd5690c-d92f-42b5-ae6e-3340ab1e5020", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20615", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3li3pnchaj52s", "content": "", "creation_timestamp": "2025-02-13T22:15:50.504179Z"}, {"uuid": "025a2550-277a-4ad3-a639-e2972cc29c1c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20615", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4365", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-20615\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-02-13T22:15:11.590\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-044-01\n2. https://www.qardio.com/about-us/#contact", "creation_timestamp": "2025-02-13T23:11:47.000000Z"}, {"uuid": "8052fe27-09f7-4813-bbf1-e81cf52a88cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20615", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4395", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-20615\n\ud83d\udd25 CVSS Score: 6.1 (CVSS_V3)\n\ud83d\udd39 Description: The Qardio Arm iOS application exposes sensitive data such as usernames \nand passwords in a plist file. This allows an attacker to log in to \nproduction-level development accounts and access an engineering backdoor\n in the application. The engineering backdoor allows the attacker to \nsend hex-based commands over a UI-based terminal.\n\ud83d\udccf Published: 2025-02-14T00:30:44Z\n\ud83d\udccf Modified: 2025-02-14T00:30:44Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-20615\n2. https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-044-01\n3. https://www.qardio.com/about-us/#contact", "creation_timestamp": "2025-02-14T01:16:08.000000Z"}]}