Android users running the popular CyanogenMod third-party ROM could fall victim to man-in-the-middle (MitM) attacks, apparently possible because of the re-use of sample Java code.
According to a news report from The Register, CyanogenMod developers re-used a snippet of code provided by Oracle as proof of concept code to process SSL certificates and validate hostnames. The 10 year old piece of code, publicly available on GitHub, is known to contain flaws which allow attackers to pass a SSL certificate as valid for a different one and still pass the scrutiny of certificate Authorities.
“If you go and create a SSL certificate for a domain you own, say evil.com and in an element of the certificate signing request such as the ‘organization name’ field you put the ‘value, cn=*domain name*, it will be accepted as the valid domain name for the certificate,” the researcher claiming the discovery, said. “Since CyanogenMod uses this implementation for its browsers so you can go now and MitM someone’s phone,” he added.
Bogdan Botezatu, Senior E-Threat Analyst, said:
“Vulnerabilities that affect the digital trust chain can deal a devastating blow to mobile users who are already spending significant time connected to insecure networks. Fortunately, the bug affects CyanogenMod only, a mobile OS that enjoys constant patching and frequent automatic updates, unlike proprietary ROMs.”
The vulnerability was apparently first disclosed in 2012. Bitdefender advises Cyanogen users to update their system as soon as possible.
tags
Alexandra started writing about IT at the dawn of the decade - when an iPad was an eye-injury patch, we were minus Google+ and we all had Jobs.
View all postsSeptember 06, 2024
September 02, 2024
August 13, 2024