mediumCWE-16M8:2024

Security Misconfiguration (Mobile)

Mobile app ships with debug mode enabled, excessive permissions, exported activities, or backup allowed — exposing data and functionality to other apps.

How It Works

Mobile security misconfiguration includes debug mode left enabled in release builds, requesting unnecessary permissions, Android components exported without protection, allowing app data backup, or not using the latest security features. Debug mode can expose logging, enable arbitrary code execution, and bypass security checks. Excessive permissions give the app (and any attacker who compromises it) access to sensitive device resources.

Vulnerable Code
<!-- AndroidManifest.xml -->
<application
  android:debuggable="true"
  android:allowBackup="true">
  <activity
    android:name=".AdminActivity"
    android:exported="true" />
Secure Code
<!-- AndroidManifest.xml -->
<application
  android:debuggable="false"
  android:allowBackup="false">
  <activity
    android:name=".AdminActivity"
    android:exported="false" />

Real-World Example

In 2020, a popular Indian payment app (Paytm) was found with android:debuggable=true in its production build. This allowed attackers to attach a debugger, inspect memory, and potentially extract sensitive payment information.

How to Prevent It

  • Always set debuggable=false in release builds
  • Request only necessary permissions
  • Set exported=false for internal components
  • Disable android:allowBackup or encrypt backup data

Affected Technologies

MobileReact NativeFlutter

Data Hogo detects this vulnerability automatically.

Scan Your Repo Free

Related Vulnerabilities