Security Advisories for Zimperium and FileCloud

6. February 2024

The pentest professionals at usd HeroLab examined Zimperium and FileCloud during their pentests.

A critical vulnerability was discovered in the Drive application of FileCloud. This is related to an outdated Electron dependency. Exploiting the vulnerability allows attackers to gain unauthorized access to sensitive data.

In Zimperium Mobile Threat Defense, a vulnerability has been discovered related to the use of a weak JWT secret that allows the creation of arbitrary JWT tokens. The exploitation of the vulnerability allows attackers to manipulate the tokens and gain unauthorized access to sensitive data, compromise administrator accounts and execute code on the underlying system.

The vulnerabilities were reported to the vendors as part of the Responsible Disclosure Policy. Detailed information on the advisories can be found here and here.

About usd HeroLab Security Advisories

In order to protect businesses against hackers and criminals, we must ensure that our skills and knowledge are up to date at all times. Therefore, security research is just as important to our work as is building up a security community to promote an exchange of knowledge. After all, more security can only be achieved if many people take on the task.

We analyze attack scenarios, which are changing constantly, and publish a series of Security Advisories on current vulnerabilities and security issues – always in line with our Responsible Disclosure Policy.

Always in the name of our mission: “more security.”

Also interesting:

SWIFT CSCFv2025 - The Three Most Important Questions About the Update

SWIFT CSCFv2025 - The Three Most Important Questions About the Update

Users of the SWIFT network are required to demonstrate compliance with the mandatory security controls through an annual independent audit in accordance with the Customer Security Control Framework (CSCF). As part of this SWIFT Assessment, the security of an...

From Unicode to Exploit: The Security Risks of Overlong UTF-8 Encodings

From Unicode to Exploit: The Security Risks of Overlong UTF-8 Encodings

In the dynamic field of cybersecurity, it is often the obscure and long-forgotten vulnerabilities that pose a hidden threat to otherwise hardened systems. One such vulnerability lies in invalid character encodings that violate the UTF-8 standard. While overlong UTF-8...

Categories

Categories