Menu
BlackBerry patches vulnerabilities in BlackBerry OS, enterprise server software

BlackBerry patches vulnerabilities in BlackBerry OS, enterprise server software

The flaws could allow attackers to access data stored on BlackBerry phones or sensitive credentials logged on servers

BlackBerry's focus on strong security as a key differentiator for its devices does not mean that they're completely free of flaws. The company released security updates Tuesday for both the OS running on its smartphones and for its enterprise server software.

BlackBerry OS version 10.2.1.1925 was released for the company's Z10, Z30, Q10 and Q5 phone models. It fixes an authentication bypass vulnerability that could allow attackers connected to the same wireless network as affected devices to read or modify data stored on them.

The flaw can only be exploited on devices that have the Wi-Fi file-sharing service running, a service that's not enabled by default.

"Using a password for file sharing is not a workaround for this vulnerability," BlackBerry said in a security advisory published Tuesday.

The company also released BlackBerry Enterprise Service version 10.2.2 and BlackBerry Enterprise Server version 5.0.4 MR7 to fix an information disclosure vulnerability that in certain cases could allow attackers to gain access to credentials stored in the server's diagnostic logs.

"During rare cases of an exception, certain credentials are logged in an encoded form or in plain text," BlackBerry said in an advisory. "For BlackBerry Enterprise Server 5, these credentials include shared secrets that are used between the Enterprise Instant Messenger server and device clients to encrypt enterprise instant messages. For BES10, they consist of shared secrets and domain credentials."

Under normal circumstances only the system administrator would have access to the server logs, but the existence of stored secrets inside them can pose a security risk if an attacker gains access to the server through a different vulnerability or by using stolen log-in credentials.

A workaround for this vulnerability is to manually delete the logs or to redact the sensitive information stored in them.

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags BlackBerry OSpatchesBlackberrysecuritymobile securityMobile OSesmobileExploits / vulnerabilities

Featured

Slideshows

Kiwi channel reunites as After Hours kicks off 2017

Kiwi channel reunites as After Hours kicks off 2017

After Hours made a welcome return to the channel social calendar last night, with a bumper crowd of distributors, vendors and resellers descending on The Jefferson in Auckland to kickstart 2017. Photos by Maria Stefina.

Kiwi channel reunites as After Hours kicks off 2017
Arrow exclusively introduces Tenable Network Security to A/NZ channel

Arrow exclusively introduces Tenable Network Security to A/NZ channel

Arrow Electronics introduced Tenable Network Security to local resellers in Sydney last week, officially launching the distributor's latest security partnership across Australia and New Zealand. Representing the first direct distribution agreement locally for Tenable specifically, the deal sees Arrow deliver security solutions directly to mid-market and enterprise channel partners on both sides of the Tasman.

Arrow exclusively introduces Tenable Network Security to A/NZ channel
Examining the changing job scene in the Kiwi channel

Examining the changing job scene in the Kiwi channel

Typically, the New Year brings new opportunities for personnel within the Kiwi channel. 2017 started no differently, with a host of appointments, departures and reshuffles across vendor, distributor and reseller businesses. As a result, the job scene across New Zealand has changed - here’s a run down of who is working where in the year ahead…

Examining the changing job scene in the Kiwi channel
Show Comments