CVE-2023-22362
📋 TL;DR
The SUSHIRO Android app logs sensitive credential information to device log files, allowing attackers with physical or remote access to the device to potentially steal authentication credentials. This affects users of SUSHIRO apps in multiple Asian regions including Thailand, Hong Kong, Singapore, and Taiwan.
💻 Affected Systems
- SUSHIRO App for Android
📦 What is this software?
Hong Kong Sushiro by Akindo Sushiro
Singapore Sushiro by Akindo Sushiro
Sushiro by Akindo Sushiro
Taiwan Sushiro by Akindo Sushiro
Thailand Sushiro by Akindo Sushiro
⚠️ Risk & Real-World Impact
Worst Case
Attackers gain full access to user accounts, potentially leading to financial fraud, identity theft, or unauthorized purchases using stored payment methods.
Likely Case
Local attackers or malicious apps with log access steal credentials, compromising user accounts and personal information.
If Mitigated
With proper app sandboxing and log access restrictions, only privileged system users could access logs, limiting exposure.
🎯 Exploit Status
Exploitation requires access to device logs, which typically needs physical access or a malicious app with appropriate permissions. No authentication bypass needed once log access is obtained.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Update to latest version from Google Play Store
Vendor Advisory: https://jvn.jp/en/jp/JVN84642320/
Restart Required: Yes
Instructions:
1. Open Google Play Store 2. Search for SUSHIRO app 3. Check for updates 4. Install latest version 5. Restart the app
🔧 Temporary Workarounds
Disable debug logging
androidPrevent sensitive data from being written to logs by disabling debug logging in the app
Restrict log access
androidUse Android permissions to restrict which apps can read system logs
🧯 If You Can't Patch
- Uninstall affected SUSHIRO app versions immediately
- Monitor device for suspicious log access attempts and implement app whitelisting
🔍 How to Verify
Check if Vulnerable:
Check app version in Google Play Store or app settings. If version matches affected list, device is vulnerable.
Check Version:
adb shell dumpsys package hk.co.akindo_sushiro.sushiroapp | grep versionName
Verify Fix Applied:
Update app through Google Play Store and verify new version doesn't match affected versions list.
📡 Detection & Monitoring
Log Indicators:
- Sensitive strings like passwords, tokens, or credentials in Android logcat output from SUSHIRO app
Network Indicators:
- Unusual authentication attempts from new devices using credentials that appeared in logs
SIEM Query:
source="android_logs" app="sushiro" (password OR token OR credential OR auth) NOT noise_terms
🔗 References
- https://jvn.jp/en/jp/JVN84642320/
- https://play.google.com/store/apps/details?id=hk.co.akindo_sushiro.sushiroapp
- https://play.google.com/store/apps/details?id=jp.co.akindo_sushiro.sushiroapp
- https://play.google.com/store/apps/details?id=sg.co.akindo_sushiro.sushiroapp
- https://play.google.com/store/apps/details?id=th.co.akindo_sushiro.sushiroapp
- https://play.google.com/store/apps/details?id=tw.co.akindo_sushiro.sushiroapp
- https://jvn.jp/en/jp/JVN84642320/
- https://play.google.com/store/apps/details?id=hk.co.akindo_sushiro.sushiroapp
- https://play.google.com/store/apps/details?id=jp.co.akindo_sushiro.sushiroapp
- https://play.google.com/store/apps/details?id=sg.co.akindo_sushiro.sushiroapp
- https://play.google.com/store/apps/details?id=th.co.akindo_sushiro.sushiroapp
- https://play.google.com/store/apps/details?id=tw.co.akindo_sushiro.sushiroapp