Impact
The XREAL Nebula App contains a flaw in CloudStoragePlugin.java that allows manipulation of the arguments accessKey, secretAccessKey, and securityToken. According to the vendor description, handling these arguments incorrectly leads to credentials being stored in an unprotected location. The weakness is a direct instance of plaintext storage of sensitive information (CWE-255) and missing encryption of sensitive data (CWE-256). If an attacker can supply malicious values, they can cause the application to write credential strings to a location that is not protected, thereby exposing them.
Affected Systems
The vulnerability affects all Android installations of XREAL Nebula App up to version 3.2.1. The flaw exists in the ai/nreal/nebula/flutterPlugin/CloudStoragePlugin.java file of the ai.nreal.nebula.universal component. No later versions are listed as impacted and no vendor patch has been publicly released as of the data provided.
Risk and Exploitability
The CVSS score of 2.0 indicates low overall severity, and the EPSS score of less than 1% shows a very low likelihood of exploitation. The vulnerability is applicable only from a local environment, requires a high level of complexity, and is described as difficult to exploit. It is not listed in the CISA Known Exploited Vulnerabilities catalog. Given these metrics, the risk is low for most users but still significant for those who rely on the app to store sensitive credentials, as exposure could lead to credential theft.
OpenCVE Enrichment