Author Topic: Cyanogenmods Updater Vulnerable to MITM Attack  (Read 426 times)

0 Members and 1 Guest are viewing this topic.

Offline Axon

  • VIP
  • King
  • *
  • Posts: 2047
  • Cookies: 319
    • View Profile
Cyanogenmods Updater Vulnerable to MITM Attack
« on: February 17, 2014, 06:56:20 pm »
So it turns out that Cyanogemod’s built in updater gets it’s update information by contacting http://download.cyanogemod.org/api


Note the http:// part there. It also turns out there’s no signature verification of the flashable .zip file that the custom recovery uses to update. What this means is that anyone who can MITM your connection (Which means the NSA to anyone who can manipulate the BGP routing table all the way down to anyone who can own your router/has access to your local LAN/WLAN) can change where the cyanogenmod update looks for the image file that CM will flash.


https://kyhwana.org/blog/2014/02/17/cyanogenmods-updater-vulnerable-to-mitm-attack/

Offline iTpHo3NiX

  • EZ's Pirate Captain
  • Administrator
  • Titan
  • *
  • Posts: 2920
  • Cookies: 328
    • View Profile
    • EvilZone
Re: Cyanogenmods Updater Vulnerable to MITM Attack
« Reply #1 on: February 18, 2014, 04:36:05 am »
Interesting post, makes me glad that I don't use CM on my phone. I wonder how OPPA (I think that's the manufacturer) feels after putting a phone out with CM baked into it
[09:27] (+lenoch) iTpHo3NiX can even manipulate me to suck dick
[09:27] (+lenoch) oh no that's voluntary
[09:27] (+lenoch) sorry