Tuesday, May 31, 2016
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
Patriot Announces 2TB Ignite SSD
ASUS Presents Zenvolution at Computex 2016
MediaTek Introduces Pump Express 3.0 Battery Charging Solution
New ARM Cortex-A73 Processor Drives Efficiency, Performance For Mobile Designs
Plextor To Showcase Its Gaming Grade SSDs at Computex 2016
Nvidia's GeForce GTX 1080 Launches Wordlwide
Corsair Bulldog PC Is Seeking A Place In Your Living Room
Samsung Galaxy C5 and C7 Released In China
Active Discussions
Which of these DVD media are the best, most durable?
How to back up a PS2 DL game
Copy a protected DVD?
roxio issues with xp pro
Help make DVDInfoPro better with dvdinfomantis!!!
menu making
Optiarc AD-7260S review
cdrw trouble
 Home > News > Mobiles > Researc...
Last 7 Days News : SU MO TU WE TH FR SA All News

Wednesday, January 22, 2014
Researchers Find VPN Vulnerability On Android Phones


Security researchers have claimed a flaw affecting Android 4.3 can be used to hijack unencrypted communications from an active VPN connection.

According to researchers at Ben Gurion University's (BGU) Cyber Security Labs, a network vulnerability on Android devices enables malicious apps to bypass active VPN configuration (no ROOT permissions required) and redirect secure data communications to a different network address. These communications are captured in CLEAR TEXT (no encryption), leaving the information completely exposed. This redirection can take place while leaving the user completely oblivious, believing the data is encrypted and secure.

The researchers also demonstrated the vulnerability in a video, using the popular Samsung S4 device running on Android 4.3. KitKat. A user opens an email client and sends an email, with VPN enabed. But a packet capturing tool installed on a computer connected to the same network as the mobile device was showing traffic flowing through it (the SMTP packets), although no communications was supposed to pass through. The data of the communications protocol was analyzed and then the researchers could read the whole mail content.

The researchers added that SSL/TLS traffic can be also captured with this exploit but the content stays encrypted and not in clear text. They also confirmed the vulnerability on multiple Android devices from different vendors.

The new find follows a bug that BGU previously claimed to have found in Samsung's secure app container Knox, which, also relied on a malicious app to bypass the security feature to intercept outgoing communications data. Samsung and Google denied it was a flaw in Android or Knox, but admitted the researchers' attack used legitimate Android functions in an unintended way.

According to BGU, the new vulnerability is similar to the previous vulnerability they had disclosed to Samsung, by the fact that both of them work in a similar manner while the difference among them is the exploit target.

The researchers said they had filed a report with Google, which is yet to respond to the claimed vulnerability.




Previous
Next
VMware to Acquire AirWatch For $1.54 Billion        All News        Toshiba Develops 522Mbps TransferJet Module for Smartphones
Jury Finds Google Infringed SimpleAir Patent     Mobiles News      Toshiba Develops 522Mbps TransferJet Module for Smartphones

Get RSS feed Easy Print E-Mail this Message

Related News
Worldwide Smartphone Sales Grew 3.9 Percent in First Quarter, Windows Phone, Blackberry Shares Keep Shrinking
Focusing On Android N
Europe Sends Statement of Objections to Google on Android And Applications
Android N Developer Preview Releases With Slit-screen
Apple Pay And Samsung Pay Launching In China
Android Trojan Steals Passwords Sent Through Voice Calls
Google Patches Nexus Devices
Google's Safe Browsing Now Available For Android
Google to Challenge Russia Antitrust Ruling on Android
Google Rumored To Design Chips For Android Phones
Google To Merge Chrome OS With Android
Android 6 Coming To LG G4

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2016 - All rights reserved -
Privacy policy - Contact Us .