EngageLab SDK Flaw Exposed 50M Android Users, Including 30M Crypto Wallets
嗯,用户让我帮忙总结一下这篇文章的内容,控制在一百个字以内。首先,我需要仔细阅读文章,理解其主要内容和重点。 文章讲的是EngageLab SDK的一个安全漏洞,这个SDK被广泛用于Android应用中,特别是加密货币钱包。漏洞允许其他应用绕过安全沙盒,访问私人数据。影响了超过3000万次安装的应用,后来被修复了。 用户的要求是用中文总结,不需要特定的开头,直接描述内容。字数限制在100字以内,所以要简洁明了。 接下来,我需要提取关键信息:EngageLab SDK的漏洞、影响范围、风险、修复情况以及潜在影响。然后把这些信息浓缩成一句话或几句话。 可能的结构是:描述漏洞、影响范围、风险、修复情况。这样既全面又简洁。 最后检查字数是否符合要求,并确保信息准确无误。 </think> 一个已修复的第三方Android SDK(EngageLab SDK)漏洞可能导致数百万加密货币钱包用户面临风险。该漏洞允许其他应用绕过安全沙盒访问私人数据,受影响应用安装量超3000万次。微软指出第三方SDK的安全问题可能对高价值领域造成重大影响。 2026-4-9 17:26:0 Author: thehackernews.com(查看原文) 阅读量:9 收藏

Vulnerability / Mobile Security

Details have emerged about a now-patched security vulnerability in a widely used third-party Android software development kit (SDK) called EngageLab SDK that could have put millions of cryptocurrency wallet users at risk.

"This flaw allows apps on the same device to bypass Android security sandbox and gain unauthorized access to private data," the Microsoft Defender Security Research Team said in a report published today.

EngageLab SDK offers a push notification service, which, according to its website, is designed to deliver "timely notifications" based on user behavior already tracked by developers. Once integrated into an app, the SDK offers a way to send personalized notifications and drive real-time engagement.

The tech giant said a significant number of apps using the SDK are part of the cryptocurrency and digital wallet ecosystem, and that the affected wallet apps accounted for more than 30 million installations. When non‑wallet apps built on the same SDK are included, the installation count surpasses 50 million.

Microsoft did not reveal the names of the apps, but noted that all those detected apps using vulnerable versions of the SDK have been removed from the Google Play Store. Following responsible disclosure in April 2025, EngageLab released version 5.2.1 in November 2025 to address the vulnerability.

The issue, identified in version 4.5.4, has been described as an intent redirection vulnerability. Intents in Android refer to messaging objects that are used to request an action from another app component.

Intent redirection occurs when the contents of an intent that a vulnerable app sends are manipulated by taking advantage of its trusted context (i.e., permissions) to gain unauthorized access to protected components, expose sensitive data, or escalate privileges within the Android environment.

An attacker could exploit this vulnerability by means of a malicious app installed on the device through some other means to access internal directories associated with an app that has the SDK integrated, resulting in unauthorized access to sensitive data.

There is no evidence that the vulnerability was ever exploited in a malicious context. That said, developers who integrate the SDK are recommended to update to the latest version as soon as possible, especially given that even trivial flaws in upstream libraries can have cascading impacts and impact millions of devices.

"This case shows how weaknesses in third‑party SDKs can have large‑scale security implications, especially in high‑value sectors like digital asset management," Microsoft said. "Apps increasingly rely on third‑party SDKs, creating large and often opaque supply‑chain dependencies. These risks increase when integrations expose exported components or rely on trust assumptions that aren’t validated across app boundaries."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/04/engagelab-sdk-flaw-exposed-50m-android.html
如有侵权请联系:admin#unsafe.sh