Case study CS-001
B2B2C digital health platform operating in the non-profit and community-health segment. Web application plus iOS and Android mobile apps. Annual transaction volume in the low eight figures.
External + authenticated assessment of web app, iOS/Android apps, and Firebase backend. Assessment was triggered by partner procurement diligence ahead of an enterprise contract.
Findings summary
Cross-tenant read access to all organization records via mobile app Firebase backend
Payout and donation ledger ($19,832 visible) readable by any authenticated mobile app user
Firestore write rules permit unauthenticated organization document creation
Audit log coverage absent on write-side Firestore operations
What we found
The web application correctly hid sensitive tenant data behind authentication. The mobile app backend did not. An attacker extracted the embedded Firebase config from the Android APK using standard decompilation (apktool + jadx), registered an anonymous account, and read 152 organization records and 1,930 payout entries. They could also write new organization documents to the production database.
Breach Notification Rule exposure
Organization tax identifiers, payout amounts, and donor records were readable across all 152 tenants. Under the Breach Notification Rule, this would have triggered individual and HHS notification if ePHI had been part of the accessible dataset. The writable Firestore rules created integrity-violation exposure under 164.312(c)(1).
Remediation
- Firestore security rules rewritten with strict tenant-scoping (organizations patched within 24 hours)
- Firebase project API keys rotated
- Write-side audit logging added to all PHI-adjacent collections
- BAA executed with Firebase covering the covered-entity partner relationship
- Full re-test 24 hours post-remediation confirmed all critical findings resolved
Outcome
Client patched critical findings within 24 hours of the report. Partner procurement accepted the remediation evidence pack. Enterprise contract closed within 60 days.