Menu
BlackBerry patches vulnerabilities in BlackBerry OS, enterprise server software

BlackBerry patches vulnerabilities in BlackBerry OS, enterprise server software

The flaws could allow attackers to access data stored on BlackBerry phones or sensitive credentials logged on servers

BlackBerry's focus on strong security as a key differentiator for its devices does not mean that they're completely free of flaws. The company released security updates Tuesday for both the OS running on its smartphones and for its enterprise server software.

BlackBerry OS version 10.2.1.1925 was released for the company's Z10, Z30, Q10 and Q5 phone models. It fixes an authentication bypass vulnerability that could allow attackers connected to the same wireless network as affected devices to read or modify data stored on them.

The flaw can only be exploited on devices that have the Wi-Fi file-sharing service running, a service that's not enabled by default.

"Using a password for file sharing is not a workaround for this vulnerability," BlackBerry said in a security advisory published Tuesday.

The company also released BlackBerry Enterprise Service version 10.2.2 and BlackBerry Enterprise Server version 5.0.4 MR7 to fix an information disclosure vulnerability that in certain cases could allow attackers to gain access to credentials stored in the server's diagnostic logs.

"During rare cases of an exception, certain credentials are logged in an encoded form or in plain text," BlackBerry said in an advisory. "For BlackBerry Enterprise Server 5, these credentials include shared secrets that are used between the Enterprise Instant Messenger server and device clients to encrypt enterprise instant messages. For BES10, they consist of shared secrets and domain credentials."

Under normal circumstances only the system administrator would have access to the server logs, but the existence of stored secrets inside them can pose a security risk if an attacker gains access to the server through a different vulnerability or by using stolen log-in credentials.

A workaround for this vulnerability is to manually delete the logs or to redact the sensitive information stored in them.


Follow Us

Join the newsletter!

Error: Please check your email address.

Tags BlackBerry OSpatchesBlackberrysecuritymobile securityMobile OSesmobileExploits / vulnerabilities

Featured

Slideshows

Meet the top performing HP partners in NZ

Meet the top performing HP partners in NZ

HP honoured leading partners across the channel at the Partner Awards 2017 in New Zealand, recognising excellence across the entire print and personal systems portfolio.

Meet the top performing HP partners in NZ
Tech industry comes together as Lexel celebrates turning 30

Tech industry comes together as Lexel celebrates turning 30

Leading figures within the technology industry across New Zealand came together to celebrate 30 years of success for Lexel Systems, at a milestone birthday occasion at St Matthews in the City.​

Tech industry comes together as Lexel celebrates turning 30
HP re-imagines education through Auckland event launch

HP re-imagines education through Auckland event launch

HP New Zealand held an inaugural Evolve Education event at Aotea Centre in Auckland, welcoming over 70 principals, teachers and education experts to explore ways of shaping and enhancing learning using technology.

HP re-imagines education through Auckland event launch
Show Comments