The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-15567

CVE-2025-15567: Health Module Information Disclosure

CVE-2025-15567 is an information disclosure vulnerability in Health Module caused by insufficient protection mechanisms. This article covers the technical details, affected versions, impact, and mitigation.

Published: March 6, 2026

CVE-2025-15567 Overview

CVE-2025-15567 is a medium-severity vulnerability affecting the Health Module in Vivo devices. The vulnerability stems from insufficient protection mechanisms that may allow attackers with local access to obtain partial sensitive information. This weakness is classified under CWE-306 (Missing Authentication for Critical Function), indicating that the Health Module lacks proper authentication controls to protect sensitive health-related data.

Critical Impact

Local attackers can exploit missing authentication mechanisms to access partial health information stored in the affected Health Module, potentially compromising user privacy.

Affected Products

  • Vivo Health Module (specific versions not disclosed)
  • Vivo mobile devices with Health Module functionality

Discovery Timeline

  • 2026-02-27 - CVE CVE-2025-15567 published to NVD
  • 2026-02-27 - Last updated in NVD database

Technical Details for CVE-2025-15567

Vulnerability Analysis

This vulnerability represents a Missing Authentication for Critical Function weakness (CWE-306) in the Vivo Health Module. The flaw allows unauthorized local access to health-related data due to insufficient protection mechanisms implemented within the module. While the impact is limited to partial information disclosure with no effect on system integrity or availability, the exposure of health data raises significant privacy concerns.

The attack requires local access to the device, meaning an attacker would need physical access or another vector to execute code locally on the affected Vivo device. No user interaction is required to exploit this vulnerability, and no special privileges are needed to access the unprotected health data.

Root Cause

The root cause of CVE-2025-15567 is the absence of proper authentication controls within the Health Module's data access mechanisms. The module fails to verify that requests for health information originate from authorized components or users, allowing any local process to potentially retrieve sensitive health-related data. This represents a fundamental design flaw where critical health data protection was not adequately implemented.

Attack Vector

The attack vector for this vulnerability is local, requiring the attacker to have access to the device either physically or through another exploitation chain. Once local access is established, the attacker can interact with the Health Module's unprotected interfaces to extract partial health information. The low complexity of exploitation, combined with no required privileges or user interaction, makes this a straightforward vulnerability to exploit once local access is achieved.

The vulnerability mechanism involves accessing the Health Module's data storage or API endpoints that lack proper authentication checks. For complete technical details, refer to the Vivo Security Advisory #19.

Detection Methods for CVE-2025-15567

Indicators of Compromise

  • Unexpected local processes accessing Health Module data directories or storage locations
  • Unusual inter-process communication (IPC) calls targeting Health Module services
  • Anomalous read operations on health-related databases or files from unauthorized applications

Detection Strategies

  • Monitor Health Module service access patterns for unauthorized local process interactions
  • Implement application-level logging to track all Health Module data access requests
  • Configure endpoint detection rules to alert on suspicious local access to health data storage paths

Monitoring Recommendations

  • Enable comprehensive logging for Health Module service interactions
  • Deploy behavioral analysis to detect anomalous local process activity targeting health data
  • Regularly audit installed applications for potential malicious software capable of exploiting local vulnerabilities

How to Mitigate CVE-2025-15567

Immediate Actions Required

  • Check for available security updates from Vivo addressing CVE-2025-15567
  • Review the Vivo Security Advisory #19 for vendor-specific guidance
  • Ensure devices are not exposed to untrusted local access or potentially malicious applications
  • Audit installed applications and remove any suspicious or unnecessary software

Patch Information

Vivo has published security advisory information regarding this vulnerability. Users should visit the Vivo Security Advisory #19 to obtain the latest patch information and update instructions. Apply all available security updates to affected devices as soon as they become available.

Workarounds

  • Restrict physical access to affected devices to prevent unauthorized local exploitation
  • Avoid installing applications from untrusted sources that could be used as a vector for local attacks
  • Consider disabling or restricting Health Module functionality if not required until patches are applied
  • Implement device management policies to control application installations on enterprise-managed devices

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeInformation Disclosure

  • Vendor/TechN/A

  • SeverityMEDIUM

  • CVSS Score5.1

  • EPSS Probability0.02%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-306
  • Technical References
  • Vivo Security Advisory #19
  • Latest CVEs
  • CVE-2025-70797: LimeSurvey XSS Vulnerability

  • CVE-2025-30650: Juniper Junos OS Auth Bypass Vulnerability

  • CVE-2026-35471: Goshs Path Traversal Vulnerability

  • CVE-2026-35393: Goshs Path Traversal Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English