{"id":57377,"date":"2025-04-07T15:04:09","date_gmt":"2025-04-07T13:04:09","guid":{"rendered":"https:\/\/www.usd.de\/?p=57377"},"modified":"2025-04-07T15:04:12","modified_gmt":"2025-04-07T13:04:12","slug":"security-advisory-element-android","status":"publish","type":"post","link":"https:\/\/www.usd.de\/en\/security-advisory-element-android\/","title":{"rendered":"Security Advisory on Element Android"},"content":{"rendered":"\n<p>The pentest professionals at <a href=\"https:\/\/herolab.usd.de\/en\/\" data-type=\"link\" data-id=\"https:\/\/herolab.usd.de\/\" target=\"_blank\" rel=\"noopener\">usd HeroLab<\/a> examined the Element application for Android during their pentests.<\/p>\n\n\n\n<p>They identified a vulnerability in the PIN protection. Under certain circumstances, the user is not logged out if he enters the wrong PIN more than the configured number of attempts. An attacker with physical access to the device can exploit this to guess the PIN.<\/p>\n\n\n\n<p>The vulnerability was reported to the vendor as part of the <a href=\"https:\/\/herolab.usd.de\/en\/responsible-disclosure\/\" data-type=\"link\" data-id=\"https:\/\/herolab.usd.de\/en\/responsible-disclosure\/\" target=\"_blank\" rel=\"noopener\">Responsible Disclosure Policy<\/a>. Detailed information on the advisory can be found here:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><strong>ID<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Product<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Vulnerability Type<\/strong><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2025-0002\/\" data-type=\"link\" data-id=\"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2025-0002\/\" target=\"_blank\" rel=\"noopener\">usd-2025-0002<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">Element Android<\/td><td class=\"has-text-align-center\" data-align=\"center\">Broken Access (CWE-284)<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">About usd HeroLab Security Advisories<\/h2>\n\n\n\n<p>In order to protect businesses against hackers and criminals, we must ensure that our skills and knowledge are up to date at all times. Therefore, security research is just as important to our work as is building up a security community to promote an exchange of knowledge. After all, more security can only be achieved if many people take on the task.<\/p>\n\n\n\n<p>We analyze attack scenarios, which are changing constantly, and publish a series of Security Advisories on current vulnerabilities and security issues \u2013 always in line with our&nbsp;<a href=\"https:\/\/herolab.usd.de\/en\/responsible-disclosure\/\" target=\"_blank\" rel=\"noreferrer noopener\">Responsible Disclosure Policy<\/a>.<\/p>\n\n\n\n<p>Always in the name of our mission: \u201cmore security.\u201d<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The pentest professionals at usd HeroLab examined the Element application for Android during their pentests. They identified a vulnerability in the PIN protection. Under certain circumstances, the user is not logged out if he enters the wrong PIN more than the configured number of attempts. An attacker with physical access to the device can exploit [&hellip;]<\/p>\n","protected":false},"author":117,"featured_media":46998,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"categories":[373,1674,10757],"tags":[12318,12730,378,12320,8541,381,11851],"class_list":["post-57377","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-en","category-security-advisories-en","category-usd-herolab-en","tag-broken-access-control-en","tag-element-android-en","tag-pentest-en","tag-schwachstelle-en","tag-security-advisory-en","tag-security-research-en","tag-vulnerabilities-2-en"],"_links":{"self":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/posts\/57377","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/users\/117"}],"replies":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/comments?post=57377"}],"version-history":[{"count":5,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/posts\/57377\/revisions"}],"predecessor-version":[{"id":57575,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/posts\/57377\/revisions\/57575"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/media\/46998"}],"wp:attachment":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/media?parent=57377"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/categories?post=57377"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/tags?post=57377"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}