Thursday, December 5, 2024
HomeUncategorizedFirebase Vulnerability Leaks 100 Million Sensitive Records - 2300 Firebase Databases &...

Firebase Vulnerability Leaks 100 Million Sensitive Records – 2300 Firebase Databases & 3,000 iOS and Android Apps Affected

Published on

SIEM as a Service

Newly discovered highly critical Firebase Vulnerability named as HospitalGown affected over 2,300 unsecured Firebase Databases & 3,000 iOS and Android Apps which exposed around 100 million records.

Firebase Vulnerability affected Android apps alone downloaded more than 620 million times and this is one of the biggest vulnerability that discovered in Android Ecosystem.

This Firebase vulnerability HospitalGown occurs when app developers fail to require authentication to a Google Firebase cloud database.

- Advertisement - SIEM as a Service

Affected Apps are Listed in Multiple categories such as productivity, health, fitness, communication, cryptocurrency, finance, tools etc.

Firebase Vulnerability exposed enterprises data that belongs to United States, Europe, the United Kingdom, Argentina, Brazil, Singapore, Taiwan, New Zealand, India, and China.

Firebase is a mobile and web application development platform owned by Google and  Firebase provides a real-time database and backend as a service and Firebase is built on Google infrastructure and scales automatically, for even the largest apps.

The service provides application developers with an API that allows application data to be synchronized across clients and stored on Firebase’s cloud.

https://twitter.com/Appthority/status/1009135233176924160

Firebase Vulnerability Affected Report

This historical Firebase vulnerability “HospitalGown” caused a very critical ranging impact and various Organization is heavily affected around the World.

Tons of sensitive data’s are exposed which is related to data privacy regulations, to sensitive intellectual property and sales information, from data that can cause potential financial fraud, to PII.

Very Scary part of this Firebase Vulnerability is that it takes little effort for attackers to find open Firebase app databases. Once found, cybercriminals can gain access to millions of private mobile data app records.

Affected Threat Scope

  • 1 in 11 Android apps (9%) and almost half of iOS apps (47%) that connect
    to a Firebase database were vulnerable
  •  More than 3,000 apps were leaking data from 2,300 unsecured servers. Of these,
    975 apps were in active customer environments.
  • 1 in 10 Firebase databases (10.34%) are vulnerable
  •  Vulnerable Android apps alone were downloaded over 620 million times
  • Over 100 million records (113 gigabytes) of data was exposed

Apart from this researchers found that 62% of enterprises have at least one vulnerable app in their mobile environment.

This Firebase vulnerability leads to Exposed sensitive data from banks, telecoms, postal services, ride-sharing companies, hotels and educational institutions.

According to Appthority, Following Apps connected to unsecured Firebase databases have exposed more than 100 million data records, including:

  • 2.6 million plain text passwords and user IDs
  • 4 million+ PHI (Protected Health Information) records, including chat
    messages and prescription details
  • 25 million GPS location records
  • 50 thousand financial records including banking, payment and Bitcoin transactions
  • 4.5 million+ Facebook, LinkedIn, Firebase and corporate data store user tokens

How does this Firebase vulnerability Discover

A researcher from Appthority finds the technique to identifies insecure backend servers connecting to mobile apps at the beginning of this year.

Using the same technique they analyzed various apps and identified the back-end databases to which they were sending data and discovered that Firebase database was one of the top 10 most popular data stores for mobile apps.

Google Firebase database accessed by mobile apps through an API server accessible via “https://<Firebase project name>.firebaseio.com/.”
“Based on the research Hackers therefore need only make a simple web request (e.g.”https://docs-examples.firebaseio.com/.json”) to a blank “.json” database to view all unprotected data hosted. “

In this case, 2.7 million iOS and Android apps found on mobile devices in enterprises, identifying apps connected to “*.firebaseio.com”

Researchers uncovered sensitive data, including PII, plaintext passwords, private access tokens, vehicle license and registration numbers, and more leaked by the vulnerable apps.

complete Vulnerability report provided to Google by Appthority and it has been notified to Affected apps developers. you can download complete Firebase vulnerability analysis report here.

Also Read:

OnePlus 6 Bootloader Vulnerability Could allows Booting any Image even the Bootloader is Locked

Zero-Day Remote Code Execution Vulnerability Discovered in Microsoft Windows JScript

100 Million iOS Users Affected by ZipperDown Vulnerability that Existing in Thousands of iOS Apps

EFAIL Attacks – How PGP & S/MIME Vulnerability Leaked Encrypted Emails in Plain Text

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

One Identity Named Winner of the Coveted Top InfoSec Innovator Awards for 2024

One Identity named Hot Company: Privileged Access Management (PAM) in 12th Cyber Defense Magazine’s...

HCL DevOps Deploy / Launch Vulnerability Let Embed arbitrary HTML tags

Recently identified by security researchers, a new vulnerability in HCL DevOps Deploy and HCL...

CISA Warns of Zyxel Firewalls, CyberPanel, North Grid, & ProjectSend Flaws Exploited in Wild

The Cybersecurity and Infrastructure Security Agency (CISA) has issued warnings about several vulnerabilities being...

HackSynth : Autonomous Pentesting Framework For Simulating Cyberattacks

HackSynth is an autonomous penetration testing agent that leverages Large Language Models (LLMs) to...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

PostgreSQL Vulnerability Allows Hackers To Execute Arbitrary SQL Functions

A critical vulnerability identified as CVE-2024-7348 has been discovered in PostgreSQL, enabling attackers to...

Security Risk Advisors Announces Launch of VECTR Enterprise Edition

Security Risk Advisors (SRA) announces the launch of VECTR Enterprise Edition, a premium version...

4 Leading Methods of Increasing Business Efficiency 

The more efficient your core business operations, the more motivated and productive your employees...