{"id":45280,"date":"2026-04-10T02:10:13","date_gmt":"2026-04-09T18:10:13","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/10\/engagelab-sdk-flaw-exposed-50m-android-users-including-30m-crypto-wallets\/"},"modified":"2026-04-10T02:10:13","modified_gmt":"2026-04-09T18:10:13","slug":"engagelab-sdk-flaw-exposed-50m-android-users-including-30m-crypto-wallets","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/10\/engagelab-sdk-flaw-exposed-50m-android-users-including-30m-crypto-wallets\/","title":{"rendered":"EngageLab SDK Flaw Exposed 50M Android Users, Including 30M Crypto Wallets"},"content":{"rendered":"<div style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEigi73Eo-lmEoLh8BcTJmWW5GrmLrm49pUkkl8zyxIg1YTEncbgCaY-wXarkWZuipJhJEubcJx-VEiHOv_NrMtPw1BoEU3Ni8gXNcKcbWX4TqBU8pikOAkRdCl-r_XvLz4oXmQ2IpY25bWzLFkXh_hezhx0jgUYiuRvrYVxhW-6x5J7m84HH_VeRtRzTGbW\/s1600\/vul-app.jpg\" style=\"display: block; padding: 1em 0; text-align: center; clear: left; float: left;\"><img decoding=\"async\" border=\"0\" data-original-height=\"470\" data-original-width=\"900\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEigi73Eo-lmEoLh8BcTJmWW5GrmLrm49pUkkl8zyxIg1YTEncbgCaY-wXarkWZuipJhJEubcJx-VEiHOv_NrMtPw1BoEU3Ni8gXNcKcbWX4TqBU8pikOAkRdCl-r_XvLz4oXmQ2IpY25bWzLFkXh_hezhx0jgUYiuRvrYVxhW-6x5J7m84HH_VeRtRzTGbW\/s1600\/vul-app.jpg\" alt=\"EngageLab SDK Flaw Exposed 50M Android Users, Including 30M Crypto Wallets\"\/><\/a><\/div>\n<p>Details have emerged about a now-patched security vulnerability in a widely used third-party Android software development kit&nbsp;(SDK) called&nbsp;<a href=\"https:\/\/www.engagelab.com\/docs\/essentials\/developer-guide\/client-sdk\/android-sdk\">EngageLab&nbsp;SDK<\/a> that could have put millions of cryptocurrency wallet users at&nbsp;risk.<\/p>\n<p>&#8220;This flaw allows apps on the same device to bypass Android security sandbox and gain unauthorized access to private&nbsp;data,&#8221; the Microsoft Defender Security Research&nbsp;Team <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2026\/04\/09\/intent-redirection-vulnerability-third-party-sdk-android\/\">said<\/a> in a report published&nbsp;today.<\/p>\n<p>EngageLab SDK offers&nbsp;a <a href=\"https:\/\/www.engagelab.com\/app-push\">push notification&nbsp;service<\/a>, which, according to its website, is designed to&nbsp;deliver&nbsp;&#8220;timely notifications&#8221; based on user behavior already tracked by developers. Once integrated into an app, the&nbsp;SDK offers a way to&nbsp;send personalized notifications&nbsp;and drive real-time engagement.<\/p>\n<p>The tech giant said a significant number of apps using the SDK are part of the cryptocurrency and digital wallet ecosystem, and that the affected wallet apps accounted for more than 30 million installations. When&nbsp;non&#8209;wallet apps built on the same&nbsp;SDK are&nbsp;included, the installation count surpasses 50&nbsp;million.<\/p>\n<p>Microsoft did not reveal the names of the apps, but noted that all those detected apps using vulnerable versions of the SDK&nbsp;have been&nbsp;removed from the Google Play Store. Following responsible disclosure in April 2025, EngageLab&nbsp;released <a href=\"https:\/\/mvnrepository.com\/artifact\/com.engagelab\/engagelab\/5.2.1\">version&nbsp;5.2.1<\/a> in November 2025 to address the vulnerability.<\/p>\n<p>The issue, identified in version 4.5.4, has been described as an intent redirection vulnerability. Intents in&nbsp;Android refer&nbsp;to&nbsp;<a href=\"https:\/\/developer.android.com\/guide\/components\/intents-filters\">messaging&nbsp;objects<\/a>&nbsp;that&nbsp;are used to request an action from another app component.<\/p>\n<p>Intent redirection occurs when the contents of an&nbsp;intent that a vulnerable&nbsp;app sends are manipulated&nbsp;by taking advantage&nbsp;of its trusted context&nbsp;(i.e., permissions) to gain unauthorized access to protected components, expose sensitive data, or escalate privileges within the Android environment.<\/p>\n<p>An attacker could exploit this vulnerability&nbsp;by means&nbsp;of a malicious&nbsp;app installed on the&nbsp;device through some other&nbsp;means to access internal directories associated with an app that has the SDK integrated, resulting in unauthorized access to sensitive&nbsp;data.<\/p>\n<p>There&nbsp;is no evidence that the vulnerability was ever exploited in a malicious context. That&nbsp;said, developers who integrate the SDK are recommended to update to the latest version as soon as possible, especially given that even trivial flaws in upstream libraries can have cascading impacts and impact millions of&nbsp;devices.<\/p>\n<p>&#8220;This case shows how weaknesses in third&#8209;party SDKs can have large&#8209;scale security implications, especially in high&#8209;value sectors like digital asset management,&#8221; Microsoft said. &#8220;Apps increasingly rely on third&#8209;party SDKs, creating large and often opaque supply&#8209;chain dependencies. These&nbsp;risks increase when integrations expose exported components or rely on trust assumptions that aren&#8217;t validated across app boundaries.&#8221;<\/p>\n<div><\/div>\n<div>Found this article interesting?  Follow us on <a href='https:\/\/news.google.com\/publications\/CAAqLQgKIidDQklTRndnTWFoTUtFWFJvWldoaFkydGxjbTVsZDNNdVkyOXRLQUFQAQ' rel='noopener' target='_blank'>Google News<\/a>, <a href='https:\/\/twitter.com\/thehackersnews' rel='noopener' target='_blank'>Twitter<\/a> and <a href='https:\/\/www.linkedin.com\/company\/thehackernews\/' rel='noopener' target='_blank'>LinkedIn<\/a> to read more exclusive content we post.<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Details have emerged about a now-patched security vulnerability in a widely used third-party Android software development kit&nbsp;(SDK) called&nbsp;EngageLab&nbsp;SDK that could have put millions of cryptocurrency wallet users at&nbsp;risk.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-45280","post","type-post","status-publish","format-standard","hentry","category-thehackernews"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45280","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45280"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45280\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45280"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45280"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45280"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}