Critical Vulnerability in YONO SBI App Exposes Millions to Data Theft

Jul 3, 2025

Summary

  • Vulnerability: CVE‑2025‑45080 in YONO SBI Android app v1.23.36 allows unencrypted HTTP traffic.

  • Risk: Enables man‑in‑the‑middle (MITM) attacks—attackers can intercept or manipulate sensitive banking data.

  • Affected Users: Potentially millions using YONO’s Android version on network services, especially public Wi‑Fi.

  • Mitigation: Users should refrain from using the app until patched; developers must enforce HTTPS by disabling cleartext traffic.

Technical Breakdown: Cleartext Communications

A configuration misstep in the YONO SBI Android app’s AndroidManifest.xml — specifically android:usesCleartextTraffic="true" — allows network communications over unencrypted HTTP, overriding Android’s secure defaults for API 28+ (Android 9+)

This violates CWE‑319: Cleartext Transmission of Sensitive Information, exposing login credentials, account details, and transactional data to eavesdropping and tampering.

Threat Vectors: Eavesdropping & MITM

Because communications aren’t encrypted:

  • Eavesdropping: Credentials and transaction data can be captured in transit.

  • Manipulation: Attackers can alter data en route—potentially falsifying amounts or redirecting funds.

  • MITM Attacks: On the same network (especially public Wi‑Fi), attackers can insert themselves between the user and bank server undetected.

Severity: High Impact

With a CVSS v3.1 score of 8.8 (High), this vulnerability poses a serious threat in financial contexts, compromising confidentiality, integrity, and availability of sensitive data—all without requiring elevated privileges.

Discovery & Response

Security researcher Ishwar Kumar discovered the flaw via APK decompilation (APKTool), manifest inspection, and network traffic monitoring using Burp Suite/Wireshark.

Though the National Vulnerability Database has assigned CVE‑2025‑45080, no patch version has been publicly confirmed yet.

What You Should Do

For Developers & SBI / App Teams

  • Explicitly set android:usesCleartextTraffic="false".

  • Enforce HTTPS for all network endpoints.

  • Use Android Network Security Config for granular control.

  • Audit and update the AndroidManifest across all builds and releases.

For Users of YONO SBI App

  • Avoid using YONO SBI v1.23.36, especially on public Wi‑Fi or untrusted networks.

  • Prefer mobile data or wait for the patched version.

  • Keep an eye on app updates and official security announcements from SBI.

  • Routinely monitor bank account activity and report anomalies immediately.

Final Word

YONO SBI provides a robust suite of banking and lifestyle services—but this misconfiguration weakens overall trust. Financial apps must enforce encryption by default. Until SBI issues a secure update, users and developers alike need to act cautiously.

Disclaimer: ClearPhish maintains a strict policy of not participating in the theft, distribution, or handling of stolen data or files. The platform does not engage in exfiltration, downloading, hosting, or reposting any illegally obtained information. Any responsibility or legal inquiries regarding the data should be directed solely at the responsible cybercriminals or attackers, as ClearPhish is not involved in these activities. We encourage parties affected by any breach to seek resolution through legal channels directly with the attackers responsible for such incidents.

Latest News

Chinese State Hackers Allegedly Use Anthropic AI to Automate Cyber Attacks
Chinese State Hackers Allegedly Use Anthropic AI to Automate Cyber Attacks
Chinese State Hackers Allegedly Use Anthropic AI to Automate Cyber Attacks
Chinese State Hackers Allegedly Use Anthropic AI to Automate Cyber Attacks

Chinese State Hackers Allegedly Use Anthropic AI to Automate Cyber Attacks

Chinese State Hackers Allegedly Use Anthropic AI to Automate Cyber Attacks

Chinese State Hackers Allegedly Use Anthropic AI to Automate Cyber Attacks

Chinese State Hackers Allegedly Use Anthropic AI to Automate Cyber Attacks

Nov 17, 2025

Lost iPhone? Don’t click that “we found it” link — it’s a phishing trap
Lost iPhone? Don’t click that “we found it” link — it’s a phishing trap
Lost iPhone? Don’t click that “we found it” link — it’s a phishing trap
Lost iPhone? Don’t click that “we found it” link — it’s a phishing trap

Lost iPhone? Don’t click that “we found it” link — it’s a phishing trap

Lost iPhone? Don’t click that “we found it” link — it’s a phishing trap

Lost iPhone? Don’t click that “we found it” link — it’s a phishing trap

Lost iPhone? Don’t click that “we found it” link — it’s a phishing trap

Nov 12, 2025

AI-Generated Phishing Simulation Tools: The Future of Cybersecurity Training
AI-Generated Phishing Simulation Tools: The Future of Cybersecurity Training
AI-Generated Phishing Simulation Tools: The Future of Cybersecurity Training
AI-Generated Phishing Simulation Tools: The Future of Cybersecurity Training

AI-Generated Phishing Simulation Tools: The Future of Cybersecurity Training

AI-Generated Phishing Simulation Tools: The Future of Cybersecurity Training

AI-Generated Phishing Simulation Tools: The Future of Cybersecurity Training

AI-Generated Phishing Simulation Tools: The Future of Cybersecurity Training

Nov 7, 2025

Balancer DeFi Protocol Hit by $120 Million Exploit | Rounding Bug in Smart Contract Leads to Major Crypto Theft
Balancer DeFi Protocol Hit by $120 Million Exploit | Rounding Bug in Smart Contract Leads to Major Crypto Theft
Balancer DeFi Protocol Hit by $120 Million Exploit | Rounding Bug in Smart Contract Leads to Major Crypto Theft
Balancer DeFi Protocol Hit by $120 Million Exploit | Rounding Bug in Smart Contract Leads to Major Crypto Theft

Balancer DeFi Protocol Hit by $120 Million Exploit | Rounding Bug in Smart Contract Leads to Major Crypto Theft

Balancer DeFi Protocol Hit by $120 Million Exploit | Rounding Bug in Smart Contract Leads to Major Crypto Theft

Balancer DeFi Protocol Hit by $120 Million Exploit | Rounding Bug in Smart Contract Leads to Major Crypto Theft

Balancer DeFi Protocol Hit by $120 Million Exploit | Rounding Bug in Smart Contract Leads to Major Crypto Theft

Nov 4, 2025

RedTiger Infostealer Targets Discord Users via Fake Game Mods
RedTiger Infostealer Targets Discord Users via Fake Game Mods
RedTiger Infostealer Targets Discord Users via Fake Game Mods
RedTiger Infostealer Targets Discord Users via Fake Game Mods

RedTiger Infostealer Targets Discord Users via Fake Game Mods

RedTiger Infostealer Targets Discord Users via Fake Game Mods

RedTiger Infostealer Targets Discord Users via Fake Game Mods

RedTiger Infostealer Targets Discord Users via Fake Game Mods

Oct 27, 2025

New “CoPhish” Attack Exploits Microsoft Copilot Studio to Steal OAuth Tokens
New “CoPhish” Attack Exploits Microsoft Copilot Studio to Steal OAuth Tokens
New “CoPhish” Attack Exploits Microsoft Copilot Studio to Steal OAuth Tokens
New “CoPhish” Attack Exploits Microsoft Copilot Studio to Steal OAuth Tokens

New “CoPhish” Attack Exploits Microsoft Copilot Studio to Steal OAuth Tokens

New “CoPhish” Attack Exploits Microsoft Copilot Studio to Steal OAuth Tokens

New “CoPhish” Attack Exploits Microsoft Copilot Studio to Steal OAuth Tokens

New “CoPhish” Attack Exploits Microsoft Copilot Studio to Steal OAuth Tokens

Oct 27, 2025

Get updates in your inbox directly

You are now subscribed.

Get updates in your inbox directly

You are now subscribed.

Get updates in your

inbox directly

You are now subscribed.

Get updates in your inbox directly

You are now subscribed.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.