A significant security vulnerability has been identified in version 1.23.36 of the YONO SBI Banking & Lifestyle app, potentially exposing millions of users to serious data breaches. This flaw, officially logged as CVE-2025-45080, stems from the app's insecure network configuration, which permits the transmission of data in cleartext. Despite standard Android security protocols that typically enforce encrypted communication for newer API levels, this specific version of the YONO SBI app, a widely used mobile banking platform from the State Bank of India. The root cause of this vulnerability lies within the app's AndroidManifest.xml file, which includes the attribute android:usesCleartextTraffic="true". This setting overrides default security measures, allowing unencrypted HTTP communication for sensitive data like login credentials, account specifics, and transaction details. When users access the app via public or unsecured Wi-Fi networks, attackers on the same network can readily intercept, view, or even manipulate this unencrypted information. This creates a significant risk of man-in-the-middle (MITM) attacks, where malicious actors could eavesdrop on communications, tamper with data, or redirect users to fraudulent servers. The discovery of this flaw was confirmed by security researcher Ishwar Kumar, who utilized tools like APKTool for decompilation and Burp Suite along with Wireshark for network traffic analysis. As of July 2, 2025, the State Bank of India has not yet issued an official statement or provided guidance to its users regarding this critical security lapse. Until an official fix or update becomes available, users should avoid using the YONO SBI app on any unsecure or public Wi-Fi networks. This will help reduce the chance of your data being exposed.
A critical security issue has been identified in Google Cloud’s Vertex AI platform that allows low-privileged users to escalate privileges and compromise high-permission service ...
A set of critical vulnerabilities has been identified in CrewAI, a widely used platform for building multi-agent AI systems. These flaws expose environments to prompt injection att...
A critical security flaw in Oracle WebLogic Server has rapidly become a prime target for attackers worldwide. Identified as CVE-2026-21962, the issue carries the highest possible s...