EvilZone
Welcome,
Guest
. Please
login
or
register
.
1 Hour
1 Day
1 Week
1 Month
Forever
Login with username, password and session length
News:
Home
Help
Search
Login
Register
EvilZone
»
Hacking and Security
»
Hacking and Security
(Moderator:
RedBullAddicted
) »
Cyanogenmods Updater Vulnerable to MITM Attack
Print
Pages: [
1
]
Author
Topic: Cyanogenmods Updater Vulnerable to MITM Attack (Read 426 times)
0 Members and 1 Guest are viewing this topic.
Axon
VIP
King
Posts: 2047
Cookies: 319
Cyanogenmods Updater Vulnerable to MITM Attack
«
on:
February 17, 2014, 06:56:20 pm »
So it turns out that Cyanogemod’s built in updater gets it’s update information by contacting
http://download.cyanogemod.org/api
Note the http:// part there. It also turns out there’s no signature verification of the flashable .zip file that the custom recovery uses to update. What this means is that anyone who can MITM your connection (Which means the NSA to anyone who can manipulate the BGP routing table all the way down to anyone who can own your router/has access to your local LAN/WLAN) can change where the cyanogenmod update looks for the image file that CM will flash.
https://kyhwana.org/blog/2014/02/17/cyanogenmods-updater-vulnerable-to-mitm-attack/
Report to moderator
Logged
iTpHo3NiX
EZ's Pirate Captain
Administrator
Titan
Posts: 2920
Cookies: 328
Re: Cyanogenmods Updater Vulnerable to MITM Attack
«
Reply #1 on:
February 18, 2014, 04:36:05 am »
Interesting post, makes me glad that I don't use CM on my phone. I wonder how OPPA (I think that's the manufacturer) feels after putting a phone out with CM baked into it
Report to moderator
Logged
Wireless Auditing with Kali Linux - aircrack-ng, reaver, and pixiewps
IRC Basics Guide
[09:27] (+lenoch) iTpHo3NiX can even manipulate me to suck dick
[09:27] (+lenoch) oh no that's voluntary
[09:27] (+lenoch) sorry
Print
Pages: [
1
]
EvilZone
»
Hacking and Security
»
Hacking and Security
(Moderator:
RedBullAddicted
) »
Cyanogenmods Updater Vulnerable to MITM Attack