CVE-2023-42261
Description
Mobile Security Framework (MobSF) <=v3.7.8 Beta is vulnerable to Insecure Permissions. NOTE: the vendor's position is that authentication is intentionally not implemented because the product is not intended for an untrusted network environment. Use cases requiring authentication could, for example, use a reverse proxy server.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Mobile Security Framework (MobSF) ≤3.7.8 Beta has insecure permissions due to no authentication by design; intended for trusted networks only.
Vulnerability
Mobile Security Framework (MobSF) versions up to and including 3.7.8 Beta suffer from insecure permissions, as the application does not enforce any authentication mechanism. This design choice means that anyone who can reach the web interface has full access to all features without needing to log in [1]. The vendor explicitly states that authentication is intentionally not implemented because the product is not intended for untrusted network environments [1].
Exploitation
An attacker with network access to the MobSF instance (e.g., on the same local network or via exposed ports) can access the web UI and REST APIs without any credentials. No prior authentication or authorization is required to perform any action, including triggering static or dynamic analysis, uploading files, or viewing results [2][4]. The default Docker Compose configuration exposes port 8000 without any proxy, making the instance directly accessible if deployed as-is [4].
Impact
Successful exploitation grants an attacker complete control over the MobSF instance. They can submit mobile applications for analysis, view analysis reports, access sensitive data from scanned apps, and potentially modify configurations. This can lead to exposure of proprietary application code, credentials, or other confidential information processed by MobSF [1][2].
Mitigation
The vendor recommends deploying MobSF behind a reverse proxy that enforces authentication (e.g., HTTP Basic Auth, OAuth) when used in untrusted networks [1]. No software patch is provided as the vendor considers this behavior by design. Users are advised to follow secure deployment practices and never expose MobSF directly to untrusted networks.
- NVD - CVE-2023-42261
- GitHub - MobSF/Mobile-Security-Framework-MobSF: Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.
- Mobile-Security-Framework-MobSF/docker-compose.yml at abb47659a19ac772765934f184c65fe16cb3bee7 · MobSF/Mobile-Security-Framework-MobSF
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
mobsfPyPI | < 3.9.7 | 3.9.7 |
Affected products
2- Mobile Security Framework/Mobile Security Frameworkdescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- github.com/advisories/GHSA-cc8j-6phr-jv9xghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2023-42261ghsaADVISORY
- github.com/MobSF/Mobile-Security-Framework-MobSF/blob/abb47659a19ac772765934f184c65fe16cb3bee7/docker-compose.ymlghsaWEB
- github.com/MobSF/Mobile-Security-Framework-MobSF/issues/1211ghsaWEB
- github.com/MobSF/Mobile-Security-Framework-MobSF/issues/748ghsaWEB
- github.com/pypa/advisory-database/tree/main/vulns/mobsf/PYSEC-2023-310.yamlghsaWEB
- github.com/woshinibaba222/hack16/blob/main/Unauthorized%20Access%20to%20MobSF.mdghsaWEB
News mentions
0No linked articles in our index yet.