CVE-2024-34897

7.5 HIGH

📋 TL;DR

The Nedis SmartLife Android app v1.4.0 contains an API key disclosure vulnerability that allows attackers to extract sensitive API keys from the application. This affects users of the Nedis SmartLife app on Android devices who have version 1.4.0 installed. The exposed API keys could be used to make unauthorized requests to backend services.

💻 Affected Systems

Products:
  • Nedis SmartLife Android Application
Versions: v1.4.0
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the Android version of the Nedis SmartLife app. Other platforms or versions may not be vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain access to backend systems, manipulate smart devices, access user data, or incur financial costs through API abuse.

🟠

Likely Case

Unauthorized API calls leading to privacy violations, device manipulation, or service disruption.

🟢

If Mitigated

Limited impact if API keys are rotated, rate-limited, or have minimal permissions.

🌐 Internet-Facing: HIGH - The app communicates with internet services, making exposed API keys immediately usable by remote attackers.
🏢 Internal Only: LOW - This is a mobile app vulnerability, not an internal network issue.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires reverse engineering the Android app to extract API keys. No authentication bypass needed once keys are obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after v1.4.0 (check app store for latest)

Vendor Advisory: http://nedis.com

Restart Required: No

Instructions:

1. Open Google Play Store. 2. Search for 'Nedis SmartLife'. 3. If update available, tap 'Update'. 4. Alternatively, uninstall v1.4.0 and install latest version.

🔧 Temporary Workarounds

Uninstall Vulnerable Version

Android

Remove the vulnerable app version to prevent API key exposure.

adb uninstall com.nedis.smartlife
Settings > Apps > Nedis SmartLife > Uninstall

🧯 If You Can't Patch

  • Monitor API usage for abnormal patterns indicating key compromise
  • Contact Nedis support to request API key rotation for your account

🔍 How to Verify

Check if Vulnerable:

Check app version in Settings > Apps > Nedis SmartLife > App Info. If version is 1.4.0, you are vulnerable.

Check Version:

adb shell dumpsys package com.nedis.smartlife | grep versionName

Verify Fix Applied:

Update app via Play Store and confirm version is higher than 1.4.0 in app settings.

📡 Detection & Monitoring

Log Indicators:

  • Unusual API requests from unexpected IPs
  • Rate limit violations on API endpoints
  • Authentication failures with valid API keys

Network Indicators:

  • Traffic to Nedis API endpoints with different user-agent patterns
  • API calls without corresponding app usage logs

SIEM Query:

source="api_gateway" AND (http_user_agent="*Nedis*" OR uri_path="/nedis/*") | stats count by src_ip

🔗 References

📤 Share & Export