Impact
A weakness in the Noelse Individuals & Pro App allows manipulation of the SEGMENT_WRITE_KEY argument in the BuildConfig.java file, causing the application to use a hard‑coded cryptographic key. This flaw enables local attackers to inject data or alter user profiles, compromising both the confidentiality and integrity of sensitive information. The issue corresponds to key management and key generation weaknesses (CWE‑320, CWE‑321).
Affected Systems
The vulnerability affects Android users of Noelse Individuals & Pro App up to version 2.1.7. It involves the com.reactnative.antelope.BuildConfig.java component within com.afone.noelse and is specific to the vendor Noelse.
Risk and Exploitability
With a CVSS score of 4.8 the risk is moderate. Although EPSS data is unavailable and the flaw is not listed in CISA’s KEV catalog, a publicly available exploit exists and the attack model requires local execution on the device. Because the vendor has not yet responded to the disclosure, the likelihood of a future patch remains uncertain, increasing the potential for unmitigated exploitation.
OpenCVE Enrichment