CVE-2021-20748
📋 TL;DR
This vulnerability involves hard-coded API keys in the Retty mobile app, allowing attackers to extract credentials for external services by analyzing the app's data. It affects Retty Android versions before 4.8.13 and iOS versions before 4.11.14. Users of vulnerable versions are at risk of unauthorized access to integrated third-party services.
💻 Affected Systems
- Retty App for Android
- Retty App for iOS
📦 What is this software?
Retty by Retty
Retty by Retty
⚠️ Risk & Real-World Impact
Worst Case
Attackers gain full access to integrated external services, potentially leading to data breaches, financial fraud, or service disruption.
Likely Case
Unauthorized API usage leading to service abuse, data scraping, or unexpected charges to the service provider.
If Mitigated
Limited impact with proper API key rotation and monitoring, though initial exposure remains a concern.
🎯 Exploit Status
Exploitation requires static analysis of the app binary or network traffic inspection.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Android: 4.8.13, iOS: 4.11.14
Vendor Advisory: https://jvn.jp/en/jp/JVN26891339/index.html
Restart Required: Yes
Instructions:
1. Update Retty app via Google Play Store (Android) or App Store (iOS). 2. Ensure version is at least 4.8.13 (Android) or 4.11.14 (iOS). 3. Restart the app after update.
🔧 Temporary Workarounds
Disable App or Limit Permissions
allTemporarily uninstall or restrict app permissions to reduce exposure until patched.
🧯 If You Can't Patch
- Rotate all exposed API keys with the external service provider immediately.
- Monitor API usage for suspicious activity and implement rate limiting if possible.
🔍 How to Verify
Check if Vulnerable:
Check app version in settings: Android: Settings > Apps > Retty > App info; iOS: Settings > General > iPhone Storage > Retty.
Check Version:
N/A for mobile apps; use device settings as above.
Verify Fix Applied:
Confirm app version is Android ≥4.8.13 or iOS ≥4.11.14 after update.
📡 Detection & Monitoring
Log Indicators:
- Unusual API call patterns or errors from external services linked to Retty.
Network Indicators:
- Traffic to external services using hard-coded keys from Retty app instances.
SIEM Query:
N/A for client-side mobile app vulnerability.