제출 #781767: Wahoo Fitness Wahoo SYSTM(com.WahooFitness.SYSTM) 7.2.1 Segment Write Key Exposure정보

제목Wahoo Fitness Wahoo SYSTM(com.WahooFitness.SYSTM) 7.2.1 Segment Write Key Exposure
설명In the Android application com.WahooFitness.SYSTM version 7.2.1 , a hardcoded Segment write key was discovered in the source file com/WahooFitness/SYSTM/BuildConfig.java. An attacker can extract this key through reverse engineering and use it to send arbitrary tracking events and modify user profiles via Segment’s API. This allows injection of fraudulent analytics data, potentially leading to corrupted business intelligence, incorrect user segmentation, and misuse of downstream systems that rely on this data.
원천⚠️ https://www.notion.so/Segment-Write-Key-Exposure-Leading-to-Data-Injection-and-User-Profile-Manipulation-In-com-WahooFitne-3262de3f97fb8038808eed63af1a48b8?source=copy_link
사용자
 fxizenta (UID 28116)
제출2026. 03. 17. PM 02:20 (21 날 ago)
모더레이션2026. 04. 03. AM 02:51 (16 days later)
상태수락
VulDB 항목355053 [Wahoo Fitness SYSTM App 까지 7.2.1 켜짐 Android com.WahooFitness.SYSTM BuildConfig.java SEGMENT_WRITE_KEY 약한 암호화]
포인트들17

Do you know our Splunk app?

Download it now for free!