Menu
Second HTTPS snooping flaw breaks security for thousands of iOS apps

Second HTTPS snooping flaw breaks security for thousands of iOS apps

Hackers can exploit the vulnerability to launch man-in-the-middle attacks and decrypt traffic from the affected apps

Attackers can potentially snoop on the encrypted traffic of over 25,000 iOS applications due to a vulnerability in a popular open-source networking library.

The vulnerability stems from a failure to validate the domain names of digital certificates in AFNetworking, a library used by a large number of iOS and Mac OS X app developers to implement Web communications -- including those over HTTPS (HTTP with SSL/TLS encryption).

The flaw allows attackers in a position to intercept HTTPS traffic between a vulnerable application and a Web service to decrypt it by presenting the application with a digital certificate for a different domain name. Such man-in-the-middle attacks can be launched over insecure wireless networks, by hacking into routers or through other methods.

According to a company called SourceDNA, which tracks the use of third-party components in mobile apps, more than 25,000 iOS applications are potentially vulnerable because they use AFNetworking 2.5.2 or older versions.

The vulnerability was fixed in AFNetworking 2.5.3, released on April 20.

Applications that have certificate pinning turned on are not vulnerable, but this mechanism is only used by a small number of developers, SourceDNA said Friday in a blog post.

One interesting aspect of this flaw is that it was reported to the AFNetworking developers on March 27, one day after a different flaw that allowed HTTPS snooping was addressed in AFNetworking 2.5.2.

That vulnerability only existed in AFNetworking 2.5.1, released on Feb. 9, and it ended up affecting 1,000 of the over 100,000 iOS apps that use AFNetworking. The new flaw renders apps that use older versions of the library vulnerable as well, as long as they rely on AFNetworking for establishing HTTPS connections to Web servers.

SourceDNA set up an online service called Searchlight that can be used by users to manually check if the iOS apps installed on their devices are vulnerable. The service shows that apps from large developers like Microsoft, Yahoo and Google are potentially affected by the AFNetworking flaws.

Subscribe here for up-to-date channel news

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags patchesGoogleMicrosoftsecuritymobile securityencryptionExploits / vulnerabilitiesSourceDNAprivacyYahoo

Featured

Slideshows

StorageCraft celebrates high achievers at its inaugural A/NZ Partner Awards

StorageCraft celebrates high achievers at its inaugural A/NZ Partner Awards

Revealed at a glitzy bash in Sydney at the Ivy Penthouse, the first StorageCraft Partner Awards locally saw the vendor honour its top-performing partners with ASI Solutions, SMBiT Pro, Webroot, ACA Pacific and Soft Solutions New Zealand taking home the top awards. Photos by Maria Stefina.

StorageCraft celebrates high achievers at its inaugural A/NZ Partner Awards
Kiwi resellers make a splash on Synnex and Lenovo RotoVegas road trip

Kiwi resellers make a splash on Synnex and Lenovo RotoVegas road trip

​Synnex and Lenovo hosted 18 resellers for an action-packed weekend adventure in RotoVegas, taking in white water rafting on the Kaituna River, as well as quad biking and dinner at Stratosfare​, overlooking Lake Rotorua at the top of Mount Ngongotaha​. Photos by Synnex.

Kiwi resellers make a splash on Synnex and Lenovo RotoVegas road trip
Show Comments