Researchers from Claroty Team82 and Check Point Research (CPR) have discovered critical vulnerabilities in the widely adopted QuickBlox SDK and API, which are utilized in chat and video applications across industries such as telemedicine, smart IoT, and finance.
These vulnerabilities pose a significant threat to user privacy, enabling attackers to remotely open doors in smart intercoms, leak sensitive patient data, and gain unauthorized access to personal information.
By exploiting flaws in the QuickBlox API, attackers can access user databases, retrieve personally identifiable information (PII), and create attacker-controlled accounts. The researchers identified numerous applications using the QuickBlox framework that were also vulnerable to these exploits.
They emphasize that even when developers incorporate obstacles to hinder access to application keys, determined attackers can ultimately retrieve the keys, highlighting the persistent risk posed by these vulnerabilities.
The researchers conducted a case study on Rozcom, an Israel-based video intercom provider, to demonstrate the impact of these vulnerabilities. They discovered that the use of user IDs derived from building IDs and phone numbers allowed them to access the entire user database, enabling complete impersonation and control over intercom devices.
A similar approach on a vulnerable telemedicine app granted the researchers access to sensitive medical information, including chat history, medical files, and the ability to impersonate doctors.
This research sheds light on the significant threat that API flaws present, particularly when they are embedded in widely used frameworks like QuickBlox. Collaboration between researchers, vendors, and developers is crucial to promptly address such vulnerabilities. QuickBlox has addressed the issues with new secure architecture and API updates, but it is essential for developers to incorporate these fixes to ensure the security of their applications and protect users’ privacy.