VulnerabilitiesHIGH

EngageLab SDK Flaw Exposes Private Data on 50M Android Devices

Featured image for EngageLab SDK Flaw Exposes Private Data on 50M Android Devices
#EngageLab SDK#Android#crypto wallets#Microsoft#security flaw

Original Reporting

SASecurity Affairs·Pierluigi Paganini

AI Intelligence Briefing

CyberPings AI·Reviewed by Rohit Rana
Severity LevelHIGH

Significant risk — action recommended within 24-48 hours

🛡️
🛡️ VULNERABILITY DETAILS
CVE ID
CVSS Score
Severity RatingHigh
Affected ProductEngageLab SDK v4.5.4
VendorEngageLab
Vulnerability TypeIntent Redirection
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Actively ExploitedNot yet observed
Patch AvailableYes — version 5.2.1
Workaround Available
🎯

Basically, a flaw in an app tool lets other apps access private data on millions of Android devices.

Quick Summary

A critical flaw in EngageLab SDK exposes private data on 50 million Android devices, including 30 million crypto wallets. This vulnerability allows apps to bypass security protections, risking sensitive information. Developers have released a patch, but the incident underscores the risks of third-party SDKs.

What Happened

A serious vulnerability in the EngageLab SDK has been discovered, affecting up to 50 million Android users. This flaw allows apps to bypass Android's security measures, potentially exposing sensitive data, including information from over 30 million crypto wallets. Microsoft researchers identified this critical flaw, which enables unauthorized access to protected components within Android apps.

The Flaw

The vulnerability arises from an intent redirection issue. In simple terms, it allows a malicious app to manipulate the contents of an intent sent from a vulnerable app. This manipulation enables the attacker to execute actions with the privileges of the vulnerable app, leading to privilege escalation and unauthorized data access.

What's at Risk

The flaw primarily affects apps in the crypto and digital wallet ecosystem, making it particularly severe. The risk includes:

  • Unauthorized access to sensitive data
  • Exposure of private files
  • Privilege escalation within the Android environment

Patch Status

EngageLab addressed the issue in version 5.2.1, released on November 3, 2025. The patch involved making the vulnerable component non-exported, which prevents other apps from accessing it. Following the disclosure, affected apps were removed from the Google Play Store.

Immediate Actions

To safeguard your apps, it is crucial to:

  • Review the merged Android manifest when integrating third-party SDKs.
  • Identify any components or permissions that could compromise your app's security.

Conclusion

While no active exploitation has been confirmed, the EngageLab SDK flaw highlights significant risks associated with third-party SDKs in mobile applications. As mobile wallets and high-value apps grow in popularity, even minor flaws can have widespread implications. Developers must remain vigilant and proactive in securing their applications against such vulnerabilities.

🔍 How to Check If You're Affected

  1. 1.Review the Android manifest for exported components.
  2. 2.Check for updates to the EngageLab SDK.
  3. 3.Monitor app permissions and access controls.

🏢 Impacted Sectors

TechnologyFinance

Pro Insight

🔒 Pro insight: This incident underscores the critical need for developers to audit third-party SDKs to mitigate potential risks in mobile applications.

Sources

Original Report

SASecurity Affairs· Pierluigi Paganini
Read Original

Related Pings

HIGHVulnerabilities

Adobe Reader Zero-Day - Exploits PDFs to Target Victims

A zero-day vulnerability in Adobe Reader is being exploited through malicious PDFs. This poses a serious risk to users, especially those who open documents from unknown sources. Without a patch from Adobe, many remain vulnerable to targeted attacks.

The Register Security·
HIGHVulnerabilities

OpenAI Urges macOS Users to Update ChatGPT and Codex

OpenAI has alerted macOS users to update ChatGPT and Codex due to a supply chain attack involving the Axios library. No data was compromised, but updates are essential for security. Stay safe by ensuring your applications are current.

Cyber Security News·
CRITICALVulnerabilities

Junos OS Vulnerabilities - Critical Flaw Patched by Juniper

Juniper Networks has patched multiple vulnerabilities in Junos OS, including a critical flaw that allows remote device takeover. Users must update immediately to avoid risks.

SecurityWeek·
CRITICALVulnerabilities

Active Exploitation of SolarWinds Web Help Desk Alert

Huntress has reported active exploitation of a critical vulnerability in SolarWinds Web Help Desk. This flaw allows remote code execution, posing serious risks. Organizations must act quickly to secure their systems.

Huntress Blog·
HIGHVulnerabilities

App Domain Manager Injection - Understanding the Threat

Attackers are exploiting App Domain Manager injection to run harmful code in trusted .NET applications. This poses serious security risks. Learn how to detect and prevent these attacks.

Huntress Blog·
HIGHVulnerabilities

CISA KEV Remediation Analysis - Limits of Human Security Exposed

A new analysis reveals that critical vulnerabilities are often exploited before patches can be applied. This highlights a major flaw in traditional security practices, urging organizations to rethink their vulnerability management strategies.

BleepingComputer·