Tea continued - Unauthenticated access to 150+ Firebase databases, storage buckets and secrets
These aren't just random mobile apps with a few hundred or thousand downloads. Most of them had over 100K+, 1M+, 5M+, 10M+, 50M+, or even 100M+ downloads (Tea app only has 500K+ downloads). I’m also releasing OpenFirebase, an automated Firebase security scanner that checks for unauthorized read and/or write access on Firestore, Realtime Database, Storage Buckets, and Remote Config. It performs checks from both unauthenticated and/or authenticated perspectives, and it can bypass weak Google API key restrictions.
AI Analysis
Technical Summary
The reported security threat involves unauthenticated access to over 150 Firebase databases, storage buckets, and secrets associated with popular mobile applications. Firebase is a widely used Backend-as-a-Service (BaaS) platform by Google that provides real-time databases, cloud storage, authentication, and remote configuration services for mobile and web applications. The core issue here is misconfigured Firebase security rules that allow unauthorized users to read or write sensitive data without any authentication. This exposure affects applications with very large user bases, including apps with downloads ranging from hundreds of thousands to over 100 million, indicating a significant scale of potential data leakage or manipulation. The threat actor or researcher has also released OpenFirebase, an automated scanning tool designed to detect such misconfigurations by testing Firebase Firestore, Realtime Database, Storage Buckets, and Remote Config for unauthorized access. The tool can bypass weak Google API key restrictions, increasing the risk of exploitation. Although no known exploits are currently active in the wild, the vulnerability stems from improper security rule configurations rather than a software flaw, making it a persistent and widespread risk. The medium severity rating reflects the potential for data exposure and unauthorized data manipulation but also considers that exploitation requires misconfiguration rather than a zero-day vulnerability. The threat highlights the importance of correctly setting Firebase security rules and monitoring cloud resource permissions to prevent unauthorized access to sensitive backend data and secrets.
Potential Impact
For European organizations, the impact of this threat can be substantial, especially for those relying on Firebase for critical mobile or web applications. Unauthorized access to Firebase databases and storage buckets can lead to exposure of personally identifiable information (PII), intellectual property, and sensitive configuration data, potentially violating GDPR and other data protection regulations. Data integrity may also be compromised if attackers modify or delete data, disrupting business operations or damaging customer trust. Additionally, exposure of secrets or API keys could facilitate further attacks on connected systems or services. The reputational damage and regulatory penalties resulting from such breaches could be severe. Given the scale of affected applications, the threat could impact a broad range of sectors including finance, healthcare, retail, and public services across Europe. The availability of an automated scanning tool like OpenFirebase lowers the barrier for attackers to identify vulnerable targets, increasing the likelihood of exploitation if organizations do not promptly audit and secure their Firebase configurations.
Mitigation Recommendations
European organizations should implement the following specific mitigation measures: 1) Conduct comprehensive audits of all Firebase projects to verify that security rules enforce strict authentication and authorization, ensuring no unauthenticated read or write access is permitted. 2) Use Firebase’s built-in security rule simulator and logging features to test and monitor access patterns regularly. 3) Rotate and restrict API keys and service account credentials, applying the principle of least privilege and avoiding overly permissive API key restrictions. 4) Employ automated tools like OpenFirebase internally to proactively scan for misconfigurations before attackers can exploit them. 5) Integrate Firebase security checks into the CI/CD pipeline to prevent insecure configurations from reaching production. 6) Educate development teams on secure Firebase configuration best practices and the risks of misconfigured rules. 7) Implement anomaly detection and alerting for unusual access patterns to Firebase resources. 8) Ensure compliance with GDPR by promptly addressing any data exposure incidents and maintaining detailed access logs for forensic analysis. These steps go beyond generic advice by emphasizing continuous monitoring, automation, and developer education tailored to Firebase environments.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland
Tea continued - Unauthenticated access to 150+ Firebase databases, storage buckets and secrets
Description
These aren't just random mobile apps with a few hundred or thousand downloads. Most of them had over 100K+, 1M+, 5M+, 10M+, 50M+, or even 100M+ downloads (Tea app only has 500K+ downloads). I’m also releasing OpenFirebase, an automated Firebase security scanner that checks for unauthorized read and/or write access on Firestore, Realtime Database, Storage Buckets, and Remote Config. It performs checks from both unauthenticated and/or authenticated perspectives, and it can bypass weak Google API key restrictions.
AI-Powered Analysis
Technical Analysis
The reported security threat involves unauthenticated access to over 150 Firebase databases, storage buckets, and secrets associated with popular mobile applications. Firebase is a widely used Backend-as-a-Service (BaaS) platform by Google that provides real-time databases, cloud storage, authentication, and remote configuration services for mobile and web applications. The core issue here is misconfigured Firebase security rules that allow unauthorized users to read or write sensitive data without any authentication. This exposure affects applications with very large user bases, including apps with downloads ranging from hundreds of thousands to over 100 million, indicating a significant scale of potential data leakage or manipulation. The threat actor or researcher has also released OpenFirebase, an automated scanning tool designed to detect such misconfigurations by testing Firebase Firestore, Realtime Database, Storage Buckets, and Remote Config for unauthorized access. The tool can bypass weak Google API key restrictions, increasing the risk of exploitation. Although no known exploits are currently active in the wild, the vulnerability stems from improper security rule configurations rather than a software flaw, making it a persistent and widespread risk. The medium severity rating reflects the potential for data exposure and unauthorized data manipulation but also considers that exploitation requires misconfiguration rather than a zero-day vulnerability. The threat highlights the importance of correctly setting Firebase security rules and monitoring cloud resource permissions to prevent unauthorized access to sensitive backend data and secrets.
Potential Impact
For European organizations, the impact of this threat can be substantial, especially for those relying on Firebase for critical mobile or web applications. Unauthorized access to Firebase databases and storage buckets can lead to exposure of personally identifiable information (PII), intellectual property, and sensitive configuration data, potentially violating GDPR and other data protection regulations. Data integrity may also be compromised if attackers modify or delete data, disrupting business operations or damaging customer trust. Additionally, exposure of secrets or API keys could facilitate further attacks on connected systems or services. The reputational damage and regulatory penalties resulting from such breaches could be severe. Given the scale of affected applications, the threat could impact a broad range of sectors including finance, healthcare, retail, and public services across Europe. The availability of an automated scanning tool like OpenFirebase lowers the barrier for attackers to identify vulnerable targets, increasing the likelihood of exploitation if organizations do not promptly audit and secure their Firebase configurations.
Mitigation Recommendations
European organizations should implement the following specific mitigation measures: 1) Conduct comprehensive audits of all Firebase projects to verify that security rules enforce strict authentication and authorization, ensuring no unauthenticated read or write access is permitted. 2) Use Firebase’s built-in security rule simulator and logging features to test and monitor access patterns regularly. 3) Rotate and restrict API keys and service account credentials, applying the principle of least privilege and avoiding overly permissive API key restrictions. 4) Employ automated tools like OpenFirebase internally to proactively scan for misconfigurations before attackers can exploit them. 5) Integrate Firebase security checks into the CI/CD pipeline to prevent insecure configurations from reaching production. 6) Educate development teams on secure Firebase configuration best practices and the risks of misconfigured rules. 7) Implement anomaly detection and alerting for unusual access patterns to Firebase resources. 8) Ensure compliance with GDPR by promptly addressing any data exposure incidents and maintaining detailed access logs for forensic analysis. These steps go beyond generic advice by emphasizing continuous monitoring, automation, and developer education tailored to Firebase environments.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Source Type
- Subreddit
- netsec
- Reddit Score
- 1
- Discussion Level
- minimal
- Content Source
- reddit_link_post
- Domain
- ice0.blog
- Newsworthiness Assessment
- {"score":27.1,"reasons":["external_link","established_author","very_recent"],"isNewsworthy":true,"foundNewsworthy":[],"foundNonNewsworthy":[]}
- Has External Source
- true
- Trusted Domain
- false
Threat ID: 68d2eaf7ad5bdf3150921890
Added to database: 9/23/2025, 6:46:15 PM
Last enriched: 9/23/2025, 6:46:26 PM
Last updated: 9/24/2025, 9:35:14 AM
Views: 10
Related Threats
Cloudflare Blocks Record 22.2 Tbps DDoS Attack
MediumFBI Warns of Fake IC3 Websites Designed to Steal Personal Data
MediumState-Sponsored Hackers Exploiting Libraesva Email Security Gateway Vulnerability
HighBoyd Gaming discloses data breach after suffering a cyberattack
HighLearn to hack
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.