VPN Encryption Vulnerability On Android 77
An anonymous reader writes "Cyber security labs at Ben Gurion University have uncovered a network vulnerability on Android devices which has serious implications for users of VPNs. This vulnerability enables malicious apps to bypass active VPN configuration (no root permissions required) and redirect secure data communications to a different network address. These communications are captured in clear text (no encryption), leaving the information completely exposed. This redirection can take place while leaving the user completely oblivious, believing the data is encrypted and secure."
Re:black listing all androids in 5..4..3..2..1 (Score:5, Insightful)
Better blacklist windows, apple, blackberry, desktops, laptops.... Everything is vulnerable. Even your users. Its how you mitigate the ongoing risk that separates the men from the boys.
If you are competent enough to use MDM on your mobile devices then your end users wouldn't be installing non-approved apps anyway so they would be at minimal risk of exposure to this. If you are not, then you are just a clueless blow-hard moron and don't deserve to be in your position..
Re:black listing all androids in 5..4..3..2..1 (Score:4, Insightful)
Although a bit flippant, the parent does have a point. Most older Android devices will never see a security update or fix for this issue. It is what it is, and unless that changes, a valid response it to require a minimum level of OS on the device. This is one area where Apple excels and Android does not.
Can update (Score:1)
Many devices can update to Cyanogenmod. Mine has Android 4.2.2 as Cyanogenmod 11,without Google apps, so maybe NSA & Google access to mine is minimal.
Re: (Score:2)
Mine has Android 2.3, because CM7 is the latest version for my device.
Re: (Score:2)
My Desire HD has Jelly Bean, despite CM only supporting 2.3.
Re: (Score:2)
I think you need to fix the character encoding in your signature. slashdot uses uft-8
looks fine if you encode it right. £
Re: (Score:2)
And yet this is the only website where this happens. Tell me again how I've somehow messed up the character encoding
The ironic thing is that the sig's are parsed correctly; I had to add the à characters manually to illustrate the issue.
After preview, it turns out that the comment parser messed up that character too, and now has a tilde instead of a circumflex.
Re: Can update (Score:1)
Re: (Score:2)
Many devices can update to Cyanogenmod. Mine has Android 4.2.2 as Cyanogenmod 11,without Google apps, so maybe NSA & Google access to mine is minimal.
The list of Cyanogenmod supported devices is small compared to the wide variety of devices out there. The point about support of older devices still stands as even Cyanogen is dropping support for moderately old devices because they'd prefer to focus on supporting emerging devices.
Re: (Score:2)
It's not a security flaw, and even if it was Google could issue an update via Play to fix it for older devices. They have done just that in the past to close real holes.
Re: (Score:1)
Re: (Score:1)
Re: (Score:2)
Just taking a look at http://en.wikipedia.org/wiki/List_of_iOS_devices [wikipedia.org] I am seeing that the oldest phone supporting the current IOS version is the 4s.
From what little I know of the apple ecosystem if such a bug was found on a iPhone 3 the effective response would be the same (you are on your own, we don't support that any more).
I agree Apple is better at this but not for any reason other than they have a much smaller list of devices to deal with.
Re: (Score:2)
You are making the false assumption that when Apple releases a new OS, they stop supporting the old. That is not the case. They continue to path them.
Re: (Score:2)
Just taking a look at http://en.wikipedia.org/wiki/List_of_iOS_devices [wikipedia.org] I am seeing that the oldest phone supporting the current IOS version is the 4s.
From that page it looks like the 4 is the oldest, supporting the current iOS 7.0.4.
Re: (Score:2)
Well, the iPhone 3G is 6 years old at this point - around the era of the HTC G1 (Dream) as the first released Android device out there. So losing support for it isn't completely unexpected.
Re:black listing all androids in 5..4..3..2..1 (Score:5, Informative)
If you are competent enough to use MDM on your mobile devices then your end users wouldn't be installing non-approved apps anyway
Bullshit Apple at least has gone out of their way to make this nearly impossible. Anything you can do to remove access to the App store with any of the MDMs while the device is on the carrier network is either trivially by passed by end users, or also make doing things like installing updates for approved apps completely broken.
At best you can deny micro VPN connections and sandboxed services when unapproved apps are detected, while possibly acceptable from a security standpoint its kind of closing the barn door after the horses are out for a user perspective. They just paid $5 for their app because they "forgot company policy about not installing other apps," and now your telling them they can't use it? Does not fly well.
Then there is the little matter of the fact you can't micro VPN just anything on IOS, unless its an in house app or the app vendor is willing to make ipks available, you are SOL. Which leaves you going back to things like AnyConnect or the builtin IPSec VPN; followed shortly by the users crying about how hard it is to type their password when they need to connect, so you say will okay we can use certificate only authentication but now we need a strong password on the device, and reasonable lock screen timeout, so we know its you and not the guy who grabbed it after you left in on the seat of the bus. When you do that they really pitch a fit.
IOS devices are a disaster in terms of DLP and asset management.
Things are a tad bit better on the Android side of the house with regard to MDM, yes. I am not so sure its much better on the over all security. There seems to be lots more malware in the wild.
As far as I know from a little testing with MDM demos provided by vendors and my contacts most of them fail utterly to actually detect rooted devices. They typically look for pirate ( as in radio, not warez) app stores and root tools. They often can't tell the kernel has been modified, boot loader is unlocked, etc if minor efforts to conceal the usual tools are under taken. As Corporate MDM becomes more common the rooting community is going to start making kits that are evasive and is almost sure to succeed given the current state of MDM. To say nothing of the true malware authors out there are probably already doing.
"trivially by passed by end users" (Score:4, Interesting)
And is grounds for termination on the spot. Circumvention of corporate resources is frowned upon.
Sure MDM isn't *perfect* ( same as "everything is vulnerable"... ) but it goes a long way to prevent people from doing wrong things, and goes even further to help catch them doing it.
Now, that out of the way, some vendor's MDM is far better than others, sounds like you have been involved with the 'not as better' group.
Re: (Score:1)
That depends on a number of things:
1) A well defined corporate policy.
2) Who owns the device.
3) Who pays the bill for the device.
This whole area is a major headache for any real security consultant. As companies tend not to want to spend $600 per user just for a corporate phone, unless the cost can be justified. They also can't justify the cost of paying the bills for said devices. If they are not handling both of these then the device in question is a personal device, not a company device, and the user is
Re: (Score:2)
if the company is doing both things then it falls to company policy, and you have to pray that this policy is both a good one and well enforced. In general companies tend not to give more than slap on the wrist to individuals who are important enough to receive said company devices.
^^^This
Every company I have ever worked at or contracted with has an IT AUP that spells out some rules and says violation can be grounds for immediate termination. I have never see it used that way except once; when two employees one male and one female were caught watching porn together in his office. I am pretty sure even in that case while the AUP violation was cited for the offical reason for the firings (provided the legal out) HR was probably more worried about the future sexual harassment lawsuits
Re: (Score:1)
If you are competent enough to use MDM on your mobile devices then your end users wouldn't be installing non-approved apps anyway
Bullshit Apple at least has gone out of their way to make this nearly impossible.
Last time I checked ishit will connect over unsecured connection while VPN tunnel is being established instead of waiting for secure path.
Re: (Score:2)
Re: (Score:2)
The problem here is that i was responding to a post that was clearly related to a business environment and not in a 'consumer' environment. That you are not in that situation means your comments don't apply here, and you are taking mine out of context.
And just for the record, you are incorrect as you are an end user by definition ( which everyone is to some degree or another ), and you are also obviously a moron, with low reading comprehension skills.
Have a nice day.
Re: (Score:2)
Do you have to be so insulting, derogative, condescending and patronizing?
Yes.
Re: (Score:2)
If you aren't an end user when you use the phone what are you?
Re: black listing all androids in 5..4..3..2..1 (Score:2, Interesting)
Or, just don't depend on the embedded Android VPN and move to a MicroVPN that does not use the Native VPN client. Citrix Netscaler and other SSL VPN venders offer this and it has much better battery life and device performance in general since you are not using a fat client app.
Re: black listing all androids in 5..4..3..2..1 (Score:1, Informative)
Re: (Score:3, Insightful)
I am going to need to update our companies VPN black list to include all android devices. End of story. Problem solution.
Why would you let them on your corporate network in the first place? Who knows what random fluffy kitty screensaver apps users have installed that are happily stealing all your stuff and sending it to the Chinese government or Russian mafia?
Re: (Score:2)
I found that the stock VPN on our Samsung Galaxy S4s didn't work very well with our Cisco IPsec VPN so no one bothered.
A trial version of VPNcilla I tested last week did work just fine but I guess we'll wait to see if this gets fixed first.
Actively run the exploit... (Score:4, Insightful)
TFA says that you need to run a malicious app that intentionally exploits that system. They tested multiple android devices (and I'm assuming different versions of the OS). Also, does this work with every VPN service (like Cisco AnyConnect), or only the native system?
Would it be possible to test if any existing Play store app accidentally/intentionally triggers this exploit? I (like many Android users) don't pirate apps (even though my phone is rooted), but if the popular Play store apps are compromised, that would be a big deal for me.
Re: (Score:1)
Flexible network redirection is there to help those apps that don't normally connect to secure servers to bypass those pesky secure connections when sending your personal data. It's not a bug, it's a feature.
Re: (Score:2)
A VPN client app works by redirecting traffic away from its normal destination and towards a VPN server. It is obvious that if you allow two VPN apps to run at the same time, they get to fight over who gets to redirect the traffic -- and one of them could be nasty and redirect it to a malicious VPN server, with or without encryption.
You could restrict it so that only one VPN client app is allowed to run at a time, but it is not clear to me that it would improve security significantly. A malicious app with V
apply for your 'ordinary citizen' profile status (Score:1)
using POT (Personal Open Terminal) should not skew the results?
Not a vulnerability (Score:2)
This isn't a vulnerability at all. Apps can choose to ignore the default routing. Same on many operating systems. Windows and Linux, for example.
Re:Not a vulnerability (Score:4, Informative)
If an app is malicious and running on a machine, of course it can reroute, or look at data in RAM pre-encryption, or a number of other things.
If you want to be more secure, then only do secure comms on a trusted network, where any VPN routing is done outside of your potentially compromised device, and other routes are blocked.
Re:Not a vulnerability (Score:4, Informative)
Re: (Score:3)
I was going to say this too. I have done a bit of sockets programing on Windows, Linux and AIX and I don't know of anyway to change the next hop for route for any traffic, especially traffic not from my application that does not require elevated privileges.
More broadly speaking though all these platforms have gotten so large and complex any security at all is at this point I think largely and illusion. As long as security is based around people deploying quick prophylactics like "I'll use VPN and just enc
Re: (Score:2)
Whew (Score:5, Funny)
Misleading Title (Score:2)
This doesn't sound like vulnerability on the encryption at all but rather Android allow modification of routing table instead. This means any existing encryption stay in tact, just rather the data is going to be re-routed out of the VPN tunnel.
Re: (Score:2)
Disclosure on Friday afternoon (Score:2)
I am a fan of full disclosure and all that, but does it have to be done on a Friday afternoon? Could you not sit on the bug for just one weekend and disclose it on Monday morning, so there is a chance that the right engineers to fix it are available?
Re: (Score:2)
Where's the fun in that? Sheesh.
Re: (Score:2)
Does it really matter? I mean, if Google fixes it in 4.4 on Monday, that still leaves almost every Android phone vulnerable as they won't get the patch, ever. The Nexus line doesn't form a huge part of the Android market.
I don't think it's something that can be
Re: (Score:2)
But isn't that normal? (Score:2)
Your VPN is one network interface going this way but you still have other interfaces on different IP addresses going that way and applications are free to choose which they use.
Re: (Score:2)
Network vulnerability on Android devices? (Score:1)
All I see is, if you run an app on your own device then you can capture your own network traffic. If this ` malicious app ' can't get onto the device without user action then this isn't a vulnerability in Android.
Works as intended (Score:2)