HomeIntelligenceBrief
VULNERABILITY BRIEF🔴 Critical Vulnerability

Critical EngageLab SDK Flaw Exposes Private Data on Up to 50 M Android Devices

A critical vulnerability in the EngageLab SDK allowed malicious Android apps to bypass sandbox protections, potentially exposing private files and crypto‑wallet data on up to 50 million devices. The issue underscores the supply‑chain risk of third‑party SDKs and mandates immediate SDK updates and broader supply‑chain hardening.

LiveThreat™ Intelligence · 📅 April 10, 2026· 📰 securityaffairs.com
🔴
Severity
Critical
VU
Type
Vulnerability
🎯
Confidence
High
🏢
Affected
3 sector(s)
Actions
3 recommended
📰
Source
securityaffairs.com

Critical EngageLab SDK Flaw Exposes Private Data on Up to 50 M Android Devices

What Happened — A critical vulnerability in the EngageLab SDK (fixed in version 5.2.1) allowed malicious Android apps to bypass sandbox protections via an intent‑redirection flaw, potentially exposing private files and crypto‑wallet data on as many as 50 million devices. No active exploitation has been observed, but the flaw highlights the systemic risk of third‑party SDKs in mobile ecosystems.

Why It Matters for TPRM

  • Third‑party SDKs can introduce attack surfaces that affect all downstream customers.
  • Data‑exfiltration risk spans multiple industries, especially those handling crypto wallets or sensitive personal data.
  • Remediation may require coordinated updates across a large portfolio of mobile applications.

Who Is Affected — Mobile app developers, fintech firms, crypto‑wallet providers, and any organization that ships Android apps embedding the EngageLab SDK.

Recommended Actions

  • Verify that all in‑house and third‑party Android apps have upgraded to EngageLab SDK 5.2.1 or later.
  • Conduct a supply‑chain audit of embedded SDKs and enforce strict vetting of exported components.
  • Review app permission models and implement runtime intent validation to mitigate similar flaws.

Technical Notes — The vulnerability stems from an exported activity (MTCommonActivity) automatically added during the build process. An attacker can craft a malicious intent that the vulnerable app processes, then re‑issues with elevated privileges, granting read/write access to private content providers. No CVE number was assigned at publication; the issue was disclosed through coordinated research by Microsoft. Source: Security Affairs

📰 Original Source
https://securityaffairs.com/190586/hacking/engagelab-sdk-flaw-opens-door-to-private-data-on-50m-android-devices.html

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.