Stay Tuned!

Subscribe to our newsletter to get our newest articles instantly!

Tech Technology

EngageLab SDK Flaw Exposes 50 Million Android Users


Microsoft’s Defender Security Research Team has disclosed a severe vulnerability in the EngageLab SDK, a widely used third-party Android push notification tool, that could have allowed malicious apps to bypass Android’s security sandbox and steal private data from crypto wallets and other applications. Over 30 million crypto wallet app installations were affected, with total exposure exceeding 50 million installations when non-wallet apps using the same SDK are included.


Advertisement
Image

The EngageLab SDK is used by Android developers to manage push notifications and real-time in-app messaging. It functions as an integrated library that provides APIs for handling communication tasks. Microsoft identified the vulnerability in version 4.5.4 of the SDK and described it as an “intent redirection” flaw, a type of vulnerability where an attacker manipulates the content of an intent sent by a vulnerable app, leveraging that app’s trusted permissions to gain unauthorized access to protected components and sensitive data.

The specific issue was traced to an exported activity called MTCommonActivity that gets automatically added to an application’s Android manifest after the build process. Because this component only appears in the merged manifest generated post-build, developers often miss it during development. But in the final APK, the activity remains exported and accessible to any other app installed on the same device. A malicious app installed through other means could exploit this to access internal directories associated with the vulnerable app, gaining unauthorized access to personally identifiable information, user credentials and financial data.

The impact was particularly severe in the crypto and digital wallet space. Microsoft confirmed the flaw in multiple apps on the Google Play Store before disclosure but did not name the affected apps. All detected apps using vulnerable versions of the SDK have since been removed from the Play Store.

Microsoft reported the vulnerability to EngageLab in April 2025 and also notified the Android Security Team in May 2025 due to the Play Store distribution. EngageLab released a patched version, 5.2.1, on November 3, 2025, which fixed the issue by making the vulnerable component non-exported, blocking access from other apps.


Advertisement

Microsoft confirmed there is no evidence that the vulnerability was ever actively exploited in the wild. However, the company warned that even small flaws in upstream third-party libraries are able to have cascading effects across millions of devices, particularly in high-value sectors like digital asset management.

“Apps increasingly rely on third-party SDKs, creating large and often opaque supply-chain dependencies,” Microsoft said. “These risks increase when integrations expose exported components or rely on trust assumptions that aren’t validated across app boundaries.”

For developers using the EngageLab SDK, the advice is to update to version 5.2.1 or later immediately and to review the merged Android manifest after every build to identify any components or permissions introduced by third-party libraries that could affect security.



Source link

mt-admin

About Author

Leave a comment

Your email address will not be published. Required fields are marked *

You may also like

Tech

Emirates Palace Spends A Hefty Sum For Works…

Grursus mal suada faci lisis Lorem ipsum dolarorit ametion consectetur elit. a Vesti at bulum nec odio aea the dumm
Tech

Do not neglect the idea of Factual Knowledge in the Wroks done Perspective..

There are many variations of passages of Lorem Ipsum available but the majority have suffered alteration in that some injected