Security Advisory, weiße Schrift auf dunklem Hintergrund

Security Advisory on Element X Android

9. May 2025

Our analysts at the usd HeroLab discovered during their pentests that a locally installed malicious app can cause the Android application Element X (up to version 25.04.2) to load a manipulated website.

This website inherits similar permissions as the app itself and, depending on the configuration, may automatically be granted temporary access to the microphone and camera. The vulnerability is caused by an improperly exported component within the app. The call can be triggered by another inconspicuous application that can easily be distributed via app stores. This enables a realistic phishing attack, including unauthorized audio and video recordings of the victim.

The vulnerability was reported to the vendor as part of our Responsible Disclosure Policy and has been fixed in version 25.04.2. Detailed information on the security advisory is available here:

IDProductVulnerability Type
usd-2025-0010Element X AndroidImproper Export of Android Application Components (CWE-926)

About usd HeroLab Security Advisories

In order to protect businesses against hackers and criminals, we must ensure that our skills and knowledge are up to date at all times. Therefore, security research is just as important to our work as is building up a security community to promote an exchange of knowledge. After all, more security can only be achieved if many people take on the task.

We analyze attack scenarios, which are changing constantly, and publish a series of Security Advisories on current vulnerabilities and security issues – always in line with our Responsible Disclosure Policy.

Always in the name of our mission: “more security.”

Also interesting:

DORA Deep Dive: Threat-Led Penetration Testing (TLPT)

DORA Deep Dive: Threat-Led Penetration Testing (TLPT)

Since the publication of the original blog post in May 2024, the final version of the RTS for TLPT has been released. The blog post has been updated accordingly and now covers the current requirements. The Digital Operational Resilience Act (DORA) came into force on...

Red Teaming: 5 Questions Every IT Leader Wants Answered

Red Teaming: 5 Questions Every IT Leader Wants Answered

Many companies invest in firewalls, endpoint protection, and awareness training, assuming that this puts them in a strong position. But the reality is different: attackers do not think in terms of tools, but in terms of targets. They combine technical vulnerabilities...

Categories

Categories