Description
A flaw has been found in UCC CampusConnect App up to 14.3.5 on Android. This vulnerability affects unknown code of the file campusconnect/BuildConfig.java of the component campusconnect.ucc. This manipulation causes use of hard-coded cryptographic key
. The attack can only be executed locally. The exploit has been published and may be used.
Published: 2026-04-03
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Local key exposure that can enable unauthorized file access and potential code execution.
Action: Immediate Patch
AI Analysis

Impact

A flaw in the UCC CampusConnect Android application causes a hard‑coded cryptographic key to be used by the campusconnect.ucc component. This deficiency is classified as a cryptographic key management weakness, which can result in the exposure of sensitive data. An attacker with local access to the device could exploit this defect to read or manipulate protected files, and in some configurations may be able to execute arbitrary code. The vulnerability is listed under CWE‑320 and CWE‑321.

Affected Systems

All instances of UCC CampusConnect App installed on Android devices running version 14.3.5 or earlier are affected. The issue originates in the campusconnect/BuildConfig.java source, and the vulnerability exists up to and including build 14.3.5. No additional versions have been documented as impacted.

Risk and Exploitability

The CVSS base score is 4.8, indicating a moderate impact. EPSS data is not available, and the vulnerability is not included in the CISA KEV catalog, which suggests a lower probability of widespread exploitation at present. Nevertheless, because the flaw can be triggered on any device that has local administrative or user access, the risk to each compromised device is relatively high. An attacker would need physical or local logical access, but once that is achieved, no further remote entry is required.

Generated by OpenCVE AI on April 3, 2026 at 06:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify you are running UCC CampusConnect App version 14.3.5 or later; if not, update immediately.
  • If an updated version is not available, uninstall the app until a vendor release corrects the hard‑coded key issue.
  • Limit local user access to the device or enforce device‑level encryption to reduce the chances of local exploitation.
  • Monitor the device for unexpected file operations or application crashes that may indicate exploitation attempts.
  • Contact UCC support or consult their security advisory channels for a confirmed patch or further guidance.

Generated by OpenCVE AI on April 3, 2026 at 06:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 03 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Ucc
Ucc campusconnect App
Vendors & Products Ucc
Ucc campusconnect App

Fri, 03 Apr 2026 04:00:00 +0000

Type Values Removed Values Added
Description A flaw has been found in UCC CampusConnect App up to 14.3.5 on Android. This vulnerability affects unknown code of the file campusconnect/BuildConfig.java of the component campusconnect.ucc. This manipulation causes use of hard-coded cryptographic key . The attack can only be executed locally. The exploit has been published and may be used.
Title UCC CampusConnect App campusconnect.ucc BuildConfig.java hard-coded key
Weaknesses CWE-320
CWE-321
References
Metrics cvssV2_0

{'score': 1.7, 'vector': 'AV:L/AC:L/Au:S/C:P/I:N/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 3.3, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 3.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Ucc Campusconnect App
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-03T14:45:11.495Z

Reserved: 2026-04-02T22:08:50.188Z

Link: CVE-2026-5452

cve-icon Vulnrichment

Updated: 2026-04-03T14:45:07.923Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-03T04:17:10.950

Modified: 2026-04-03T16:10:23.730

Link: CVE-2026-5452

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T09:15:58Z

Weaknesses