{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-64696","assignerOrgId":"ede6fdc4-6654-4307-a26d-3331c018e2ce","state":"PUBLISHED","assignerShortName":"jpcert","dateReserved":"2025-12-03T02:45:34.008Z","datePublished":"2025-12-09T08:16:36.976Z","dateUpdated":"2025-12-09T14:31:41.118Z"},"containers":{"cna":{"affected":[{"vendor":"Brother Industries, Ltd.","product":"Android App \"Brother iPrint&Scan\"","versions":[{"version":"versions 6.13.7 and earlier","status":"affected"}]}],"descriptions":[{"lang":"en","value":"Android App \"Brother iPrint&Scan\" versions 6.13.7 and earlier improperly uses an external cache directory. If exploited, application-specific files may be accessed from other malicious applications."}],"problemTypes":[{"descriptions":[{"description":"Use of cache containing sensitive information","lang":"en-US","cweId":"CWE-524","type":"CWE"}]}],"references":[{"url":"https://support.brother.com/g/s/security/"},{"url":"https://jvn.jp/en/vu/JVNVU99973778/"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en-US","value":"GENERAL"}],"cvssV3_0":{"version":"3.0","baseSeverity":"LOW","baseScore":3.3,"vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}},{"format":"CVSS","scenarios":[{"lang":"en-US","value":"GENERAL"}],"cvssV4_0":{"version":"4.0","baseSeverity":"MEDIUM","baseScore":4.8,"vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N"}}],"providerMetadata":{"orgId":"ede6fdc4-6654-4307-a26d-3331c018e2ce","shortName":"jpcert","dateUpdated":"2025-12-09T08:16:36.976Z"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-12-09T14:31:36.215068Z","id":"CVE-2025-64696","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-12-09T14:31:41.118Z"}}]}}