CVE-2025-59406

6.2 MEDIUM

📋 TL;DR

The Flock Safety Pisco Android application contains a hardcoded Auth0 client secret in its codebase, allowing attackers to extract this credential through reverse engineering. This enables unauthorized access to Auth0-protected resources and potential account compromise. All users of Flock Safety's Falcon, Sparrow License Plate Readers, and Bravo Edge AI Compute Devices running the vulnerable Android app are affected.

💻 Affected Systems

Products:
  • Flock Safety Pisco Android Application
  • Falcon License Plate Reader
  • Sparrow License Plate Reader
  • Bravo Edge AI Compute Device
Versions: 6.21.11
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the Android application binary itself, affecting all installations of version 6.21.11.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain unauthorized access to Auth0-protected backend systems, potentially compromising user accounts, accessing sensitive data, or performing actions as authenticated users.

🟠

Likely Case

Attackers extract the client secret to obtain unauthorized API access, potentially accessing license plate data, camera feeds, or other protected resources.

🟢

If Mitigated

Limited impact if Auth0 has additional security controls like IP restrictions, rate limiting, or if the secret is quickly rotated and invalidated.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires reverse engineering the APK file using standard tools like apktool or jadx to extract the hardcoded secret.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

1. Contact Flock Safety for patch availability. 2. If patch is available, update the Android application to the fixed version. 3. Rotate all affected Auth0 client secrets immediately.

🔧 Temporary Workarounds

Auth0 Secret Rotation

all

Rotate the compromised Auth0 client secret to invalidate the exposed credential

Navigate to Auth0 Dashboard > Applications > Your Application > Settings > Rotate Secret

Network Segmentation

all

Restrict network access to Auth0 endpoints from only authorized devices

🧯 If You Can't Patch

  • Immediately rotate the Auth0 client secret and implement additional Auth0 security controls like IP allowlisting
  • Monitor Auth0 logs for unauthorized access attempts and implement strict rate limiting

🔍 How to Verify

Check if Vulnerable:

Decompile the APK file using apktool or jadx and search for Auth0 client secrets in the codebase

Check Version:

On Android device: Settings > Apps > Flock Safety Pisco > App info > Version

Verify Fix Applied:

Check that the updated APK no longer contains hardcoded Auth0 secrets and verify with Auth0 that new secret is in use

📡 Detection & Monitoring

Log Indicators:

  • Unusual Auth0 authentication patterns
  • API access from unexpected locations or devices

Network Indicators:

  • Unusual traffic to Auth0 endpoints from unexpected sources

SIEM Query:

source="auth0" AND (client_id="compromised_client_id" OR abnormal_auth_patterns)

🔗 References

📤 Share & Export