Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireCybersecurity News

Study reveals the state of mobile application security

application security freepik

<a href='https://www.freepik.com/vectors/technology'>Technology vector created by pikisuperstar - www.freepik.com</a>

March 26, 2021
The Synopsys Cybersecurity Research Center (CyRC) analyzed more than 3,000 popular Android applications to assess the state of mobile app security during the COVID-19 pandemic. The study targeted the most downloaded and highest grossing apps across 18 categories, many of which have seen explosive growth during the pandemic. The research focused on three core areas of mobile app security:
  • Vulnerabilities: The presence of known software vulnerabilities in the applications’ open source components
  • Information leakage: Sensitive data such as private keys, tokens, and passwords exposed in the application code
  • Mobile device permissions: Applications requiring excessive access to mobile device data and features
 
The analysis reveals that the majority of apps contain open source components with known security vulnerabilities. It also highlights other pervasive security concerns including myriad potentially sensitive data exposed in the application code and the use of excessive mobile device permissions.
 
For consumers, this report highlights the jarring reality that even the most popular mobile apps are not immune to security and privacy weaknesses and should not be trusted implicitly. For app developers, this underscores the urgent need for secure software development practices and better overall privacy and security hygiene.
 

Key findings include:

App composition – open source is eating the app store! 3,267 (98%) of the apps contained open source software (OSS) components, with an average of 20 OSS components per app.

Open source vulnerabilities in mobile apps are pervasive:

  • Of the 3,335 mobile apps analyzed, 2,115 (63%) contained OSS components with at least one known security vulnerability. This means the majority of the top Android apps used today have some sort of vulnerability, regardless of application category (lifestyle, finance, etc.) or who developed it.
  • The vulnerable apps contained an average of 39 distinct vulnerabilities.
  • 3,137 unique vulnerabilities were identified, and they appeared 82,144 times.
  • 94% of the vulnerabilities detected have publicly documented fixes, meaning there are security patches or newer, more secure versions of the OSS component available.
  • 73% of the known security vulnerabilities are more than two years old.

A deep dive on high-risk vulnerabilities – A more thorough analysis of a subset of the vulnerabilities detected revealed:

  • The bad, the ugly, and the worst: Nearly half (44%) of the vulnerabilities detected are considered high risk because they either have been actively exploited, have documented proof-of-concept (PoC) exploits, or are classified as remote code execution (RCE) vulnerabilities.
    • 43% of the vulnerabilities detected are associated with an exploit or PoC exploit
    • 4.6% of the vulnerabilities detected are associated with an exploit or PoC exploit and have no fix available
    • 1% of the vulnerabilities detected are classified as a remote code execution (RCE) vulnerability, widely recognized as the most severe class of vulnerability
    • 0.64% are associated with a PoC/exploit and are classed as RCE

Information Leakage: Occasionally, developers unintentionally leave sensitive or personal data in the source code or configuration files of the application. In the wrong hands, this information can be used maliciously. CyRC found that information leakage is commonplace in mobile apps.

  • Tokens, keys, and passwords, oh my! Sensitive info like AWS keys, Google Cloud tokens, JSON web tokens, and user credentials are the equivalent of keys to the kingdom for an attacker because they can provide access to servers, systems, or other sensitive properties. From there an attacker can steal IP, plant malware, or launch compute resources that can cost application owners a lot of money.
  • IP addresses and URLs can serve malicious content or disclose private APIs, internal systems, or hidden vendor resources, offering malicious actors an open attack vector.
  • Email addresses accidentally left behind in source code can disclose internal systems (e.g., domains) and usernames. They can then be used as attack points (especially when combined with tokens or IP addresses) or for phishing attacks.
  • Of the 3,335 applications analyzed, CyRC discovered the following instances of information leakage:
    • 65 JSON web tokens (JWTs)
    • 26 AWS keys
    • 406 Twilio tokens
    • 804 Google Cloud tokens
    • 27 Facebook tokens
    • 60 Asymmetric private keys (RSA)
    • 817 OAuth tokens
    • 10,863 Email addresses
    • 27,568 IP addresses; 4 of which are flagged as suspicious
    • 365,227 URLs; 11 of which are flagged as suspicious by Google Safebrowsing

 

  • Excessive use of mobile device permissions – “Um, why is my meditation app able to redirect my phone calls?” To function effectively, mobile apps often require access to certain features or data from your mobile device. For example, a navigation app logically needs to access your location. But some apps recklessly (or maliciously) require far more access than they really need.
    • The mobile apps analyzed by CyRC require on average of 18 device permissions.
    • Digging deeper, they require an average of 4.5 sensitive permission, or those that require the most access to personal data.
    • They also required an average of 3 permissions that Google classifies as “not intended for third-party use”
    • One application with over 1 million downloads required 11 permissions that Google classifies as “Protection Level: Dangerous.” Google only classifies 32 permissions as Dangerous, so this is a lot!
    • One application with over 5 million downloads required a total of 56 permissions, 31 of which Google classifies as “Protection Level: Dangerous” or as signature permissions that are not to be used by third-party apps.

 

Analysis of Apps by Category

  • At least 80% of the apps in six of the 18 categories contained known vulnerabilities, including games, banking, budgeting, and payment apps. The lifestyle and health & fitness categories tied for the lowest percentage of vulnerable apps at 36%.
    • Percentage of scanned apps that contained vulnerable components
      • (ALL APPS: 63%)
      • TOP FREE GAMES: 96%
      • TOP GROSSING GAMES: 94%
      • BANKING: 88%
      • BUDGETING: 84%
      • TOP PAID GAMES: 80%
      • PAYMENT: 80%
      • TOP GROSSING APPS: 61%
      • TOP FREE APPS: 59%
      • PRODUCTIVITY: 58%
      • EDUCATIONAL APPS: 57%
      • TOOLS FOR TEACHERS: 56%
      • ENTERTAINMENT: 55%
      • FOOD AND DRINK APPS: 49%
      • TOP GROSSING DATING APPS: 47%
      • TOP FREE DATING APPS: 44%
      • TOP PAID APPS: 44%
      • LIFESTYLE: 36%
      • HEALTH AND FITNESS APPS: 36%
  • The banking, payment, and budgeting categories also ranked in the top three for highest average number of mobile device permissions required, well above the overall average of 18. Games, tools for teachers, education, and lifestyle apps require the lowest average number of permissions.
    • Average number of permissions required
      • (ALL APPS: 18)
      • BUDGETING: 26
      • PAYMENT: 25
      • BANKING: 25
      • TOP FREE APPS: 22
      • TOP GROSSING APPS: 21
      • TOP GROSSING DATING APPS: 20
      • HEALTH AND FITNESS APPS: 20
      • TOP FREE DATING APPS: 19
      • PRODUCTIVITY: 19
      • FOOD AND DRINK APPS: 17
      • ENTERTAINMENT: 17
      • EDUCATIONAL APPS: 17
      • LIFESTYLE: 16
      • TOOLS FOR TEACHERS: 16
      • TOP GROSSING GAMES: 16
      • TOP FREE GAMES: 13
      • TOP PAID APPS: 10
      • TOP PAID GAMES: 8
KEYWORDS: cyber security mobile security pandemic risk management software security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cyber 4 responsive default

    Study Reveals Lack of Confidence in Mobile Payments

    See More
  • password1-900px.jpg

    Study Reveals Bad Mobile Password Habits

    See More
  • world map

    New study reveals the status of climate risk management in Latin American and Caribbean banks

    See More

Related Products

See More Products
  • databasehacker

    The Database Hacker's Handboo

See More Products

Events

View AllSubmit An Event
  • March 6, 2025

    Why Mobile Device Response is Key to Managing Data Risk

    ON DEMAND: Most organizations and their associating operations have the response and investigation of computers, cloud resources, and other endpoint technologies under lock and key. 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!