The CERT Coordination Center at Carnegie Mellon University has published the results of its test conducted on popular Android applications that fail to properly validate SSL certificates. 68% of the app doesnt check server certificates and 77% ignores SSL errors. The applications are using vulnerable libraries, such as the Flurry and Chartboost ad libraries, for this reason Android users are exposed to the risk of attacks. The researchers at CERT will contact every development team that fail the test, the scope is to make them aware of the vulnerability and to provide suggestion to fix them.”]
Source: https://securityaffairs.co/wordpress/28151/hacking/cert-test-android-apps.html

