Published:2025/09/12  Last Updated:2025/09/12

JVN#89109713
WTW-EAGLE App vulnerable to improper server certificate validation

Overview

WTW-EAGLE App provided by Wireless Tsukamoto Co., Ltd. is vulnerable to improper server certificate validation.

Products Affected

  • WTW-EAGLE App for iOS versions prior to 4.4.1
  • WTW-EAGLE App for Android versions prior to 4.4.0.10

Description

WTW-EAGLE App provided by Wireless Tsukamoto Co., Ltd. contains the following vulnerability.

  • Improper server certificate validation (CWE-295)
    • CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N Base Score 6.3
    • CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N Base Score 4.8
    • CVE-2025-58781

Impact

A man-in-the-middle attacker may be able to monitor encrypted traffic.

Solution

Update the application
Update the application to the latest version according to the information provided by the developer.

Vendor Status

References

JPCERT/CC Addendum

CVSS v3 and v4 scores for CVE-2025-58781 are based on the scenario where an attacker performs a man-in-the-middle attack using a malicious wireless LAN access point.

Vulnerability Analysis by JPCERT/CC

Credit

Shogo Iyota of GMO Cybersecurity by Ierae reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2025-58781
JVN iPedia JVNDB-2025-000048