Windows 10 News and info | Forum
September 24, 2018, Loading... *
Welcome, Guest. Please login or register.

Login with username, password and session length
News: This is a clean Ad-free Forum and protected by StopForumSpam, Project Honeypot, Botscout and AbuseIPDB | This forum does not use audio ads, popups, or other annoyances.
 
  Website   Home   Windows 8 Website GDPR Help Login Register  
By continuing to use the site or Forum, you agree to the use of cookies, find out more by reading our GDPR policy.
Pages: [1]
  Print  
Share this topic on Del.icio.usShare this topic on DiggShare this topic on FacebookShare this topic on GoogleShare this topic on MySpaceShare this topic on RedditShare this topic on StumbleUponShare this topic on TechnoratiShare this topic on TwitterShare this topic on YahooShare this topic on Google buzz
Author Topic: Android Phones Expose Sensitive Data via Internal System Broadcasts  (Read 41 times)
javajolt
Administrator
Hero Member
*****
Online Online

Gender: Male
United States United States

Posts: 28947


I Do Windows


WWW Email
« on: August 30, 2018, 02:16:50 PM »
ReplyReply

Internal system broadcasts happening inside the Android OS expose sensitive user and device details that apps installed on the phone can access without the user's knowledge or permission.

The leaked data includes details such as the WiFi network name, WiFi network BSSID, local IP addresses, DNS server information, and the device's MAC address.

This type of data might look innocuous, but it can be used to track users online and determine a user's real-world location.

OS "intents" leak MACs and WiFi-related data

The leak happens because of an internal feature of the Android OS named "intents."

Intents allow an app or the OS itself to send an internal system-wide message that can be read by all apps and OS functions running on an Android device.

Mobile security researchers from Nightwatch Cybersecurity have discovered that the Android OS broadcasts information about the WiFi connection and the WiFi network interface via two separate intents —WifiManager's NETWORK_STATE_CHANGED_ACTION and WifiP2pManager's WIFI_P2P_THIS_DEVICE_CHANGED_ACTION.

Apps installed on an Android —including their advertising components— can set up listening posts for these two intents and capture WiFi-related information even if they don't have the permission to access a phone's WiFi feature (granted by the user to apps at install time).

Leak undermines Android's permission system

This leak completely undermines the Android permission system, as it allows applications access to highly sensitive information without prompting the user for action.

For example, an advertiser or a malicious threat actor who have tricked a user into installing a benign-looking app can harvest WiFi info from system-wide intents and use this data to query public databases of known BSSID identifiers —such as WiGLE or SkyHook— and track down a user's real-world location.

In this scenario, the app doesn't need to ask for the WiFi Access permission, and indirectly through the harvested data, the Location Access permission as well.

Google won't fix older Android OS versions

The Nightwatch team says that all versions of Android are believed to be affected, including forks such as Amazon's FireOS (for the Kindle).

Researchers said they reported the issue (tracked as CVE-2018-9489) to Google in March this year.

Nightwatch said Google opted to fix the WiFi broadcast leaks only in the new Android Pie (9.0) version, but not in the older versions.

source
« Last Edit: August 30, 2018, 02:35:58 PM by javajolt » Logged



Pages: [1]
  Print  
 
Jump to:  

Powered by SMF 1.1.21 | SMF © 2017, Simple Machines

Google visited last this page September 08, 2018, 05:58:08 PM