ALERT: Some images may not load properly within the Knowledge Base Article. If you see a broken image, please right-click and select 'Open image in a new tab'. We apologize for this inconvenience.

Recommendation to Address the HospitalGown - Firebase Threat

book

Article ID: 173306

calendar_today

Updated On:

Products

Endpoint Protection Mobile

Issue/Introduction

Appthority customers already have advanced detection available to identify iOS and Android apps vulnerable to the HospitalGown - Firebase threat. 

Resolution

Appthority recommends enterprises take the following priority actions:

  • Understand your full exposure to this vulnerability from apps on COPE and BYO devices by activating the HospitalGown - Firebase Threat Indicator in your Organization’s Appthority MTP Manager (directions below).
  • Secure your company-branded consumer public apps.
  • Secure your EMM published applications (internal and public).
  • Educate your employees on security risks of affected personally downloaded apps on employee devices (Employee email template available here).

In Appthority MTP Manager, follow these steps to identify affected apps in your Organization:

Contact your Appthority account team directly or [email protected] if you have questions.

  1. Navigate to the Compliance > Threat Indicators tab, use Search to locate the new HospitalGown - Firebase Threat Indicator.
    • Click in the Apps column and review the list of affected apps.
    • Select the new HospitalGown - Firebase Threat Indicator and activate it (check mark and click Actions > Activate).
    • Tip: If you haven't already reviewed the apps affected by the other HospitalGown TIs, now is a good time to do so.  
  2. Navigate to the Compliance > App Policies tab, configure the HospitalGown - Firebase Threat Indicator as part of your custom App Policy set.
    • Note: Add a Market Category filter to the App Policy to find only business related applications affected by the HospitalGown - Firebase vulnerability.

Contact your Appthority account team directly or [email protected] if you have questions.

Attachments