
Cloud Vulnerability DB
A community-led vulnerabilities database
The CVE-2024-23453 affects Android Spoon application versions 7.11.1 to 8.6.0, which contains a security vulnerability related to hard-coded credentials. The vulnerability was discovered and reported by Yoshihito Sakai of BroadBand Security, Inc. to IPA, and was publicly disclosed on January 23, 2024. The issue affects the Spoon mobile application, a popular audio streaming and podcast platform with over 30 million users worldwide (NVD, JVN Advisory).
The vulnerability is classified as CWE-798 (Use of Hard-coded Credentials) with a CVSS v3.1 base score of 5.5 (Medium) using the vector CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N. The technical issue stems from the application using hard-coded API keys that can be exposed through reverse engineering of the application binary (NVD).
When exploited, this vulnerability allows a local attacker to retrieve the hard-coded API key by reverse-engineering the application binary. The exposed API key could potentially be used for unauthorized access to associated services. It's important to note that while this poses a security risk to the service infrastructure, direct application users are not immediately affected by this vulnerability (JVN Advisory).
The vulnerability has been fixed in Android Spoon application version 8.6.1 and later. Users are advised to update their application to the latest version available through the official Google Play Store to mitigate this security risk (JVN Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."