CVE-2025-63289

9.1 CRITICAL

📋 TL;DR

The Sogexia Android app contains hardcoded encryption keys in its SDK, allowing attackers to decrypt sensitive data stored or transmitted by the app. This affects all users of the app with SDK versions 35 or below, potentially exposing personal information, authentication tokens, or other encrypted content.

💻 Affected Systems

Products:
  • Sogexia Android App
Versions: SDK v35 and below (Max SDK 32 mentioned, but v35 is affected)
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects the encryption_helper.dart file in the app's SDK. All installations using vulnerable SDK versions are affected by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all encrypted user data, including credentials, personal information, and sensitive app data, leading to identity theft, account takeover, and privacy violations.

🟠

Likely Case

Extraction of sensitive user data from app storage or intercepted communications, enabling targeted attacks, data harvesting, or credential reuse.

🟢

If Mitigated

Limited exposure if app uses additional security layers, but hardcoded keys remain a fundamental flaw that undermines encryption.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires extracting the hardcoded keys from the app binary, which is straightforward with reverse engineering tools. No authentication needed as keys are embedded in the app.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: SDK v36

Vendor Advisory: Not provided in references

Restart Required: Yes

Instructions:

1. Update the Sogexia Android app to a version built with SDK v36 or higher. 2. Recompile the app if developing with the SDK. 3. Distribute the updated app through Google Play Store or other distribution channels. 4. Users must install the updated version.

🔧 Temporary Workarounds

Disable App or Restrict Permissions

android

Temporarily disable the app or restrict its permissions to limit data exposure until patched.

🧯 If You Can't Patch

  • Monitor for unusual data access patterns or unauthorized decryption attempts.
  • Implement additional encryption layers with dynamically generated keys stored securely.

🔍 How to Verify

Check if Vulnerable:

Decompile the APK and inspect encryption_helper.dart for hardcoded encryption keys. Check SDK version in build.gradle or app metadata.

Check Version:

Check app info in Android Settings or use 'adb shell dumpsys package <package_name>' to view version details.

Verify Fix Applied:

Confirm the app uses SDK v36 or higher and that encryption_helper.dart no longer contains hardcoded keys.

📡 Detection & Monitoring

Log Indicators:

  • Unusual decryption attempts, errors in encryption/decryption processes, or unexpected data access logs.

Network Indicators:

  • Intercepted encrypted traffic that can be decrypted with known keys, or anomalies in data transmission patterns.

SIEM Query:

Search for events related to the Sogexia app with decryption failures or unauthorized data access.

🔗 References

📤 Share & Export