Menu
BlackBerry patches vulnerabilities in BlackBerry OS, enterprise server software

BlackBerry patches vulnerabilities in BlackBerry OS, enterprise server software

The flaws could allow attackers to access data stored on BlackBerry phones or sensitive credentials logged on servers

BlackBerry's focus on strong security as a key differentiator for its devices does not mean that they're completely free of flaws. The company released security updates Tuesday for both the OS running on its smartphones and for its enterprise server software.

BlackBerry OS version 10.2.1.1925 was released for the company's Z10, Z30, Q10 and Q5 phone models. It fixes an authentication bypass vulnerability that could allow attackers connected to the same wireless network as affected devices to read or modify data stored on them.

The flaw can only be exploited on devices that have the Wi-Fi file-sharing service running, a service that's not enabled by default.

"Using a password for file sharing is not a workaround for this vulnerability," BlackBerry said in a security advisory published Tuesday.

The company also released BlackBerry Enterprise Service version 10.2.2 and BlackBerry Enterprise Server version 5.0.4 MR7 to fix an information disclosure vulnerability that in certain cases could allow attackers to gain access to credentials stored in the server's diagnostic logs.

"During rare cases of an exception, certain credentials are logged in an encoded form or in plain text," BlackBerry said in an advisory. "For BlackBerry Enterprise Server 5, these credentials include shared secrets that are used between the Enterprise Instant Messenger server and device clients to encrypt enterprise instant messages. For BES10, they consist of shared secrets and domain credentials."

Under normal circumstances only the system administrator would have access to the server logs, but the existence of stored secrets inside them can pose a security risk if an attacker gains access to the server through a different vulnerability or by using stolen log-in credentials.

A workaround for this vulnerability is to manually delete the logs or to redact the sensitive information stored in them.

Subscribe here for up-to-date channel news

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags BlackBerry OSpatchesBlackberrysecuritymobile securityMobile OSesmobileExploits / vulnerabilities

Featured

Slideshows

StorageCraft celebrates high achievers at its inaugural A/NZ Partner Awards

StorageCraft celebrates high achievers at its inaugural A/NZ Partner Awards

Revealed at a glitzy bash in Sydney at the Ivy Penthouse, the first StorageCraft Partner Awards locally saw the vendor honour its top-performing partners with ASI Solutions, SMBiT Pro, Webroot, ACA Pacific and Soft Solutions New Zealand taking home the top awards. Photos by Maria Stefina.

StorageCraft celebrates high achievers at its inaugural A/NZ Partner Awards
Kiwi resellers make a splash on Synnex and Lenovo RotoVegas road trip

Kiwi resellers make a splash on Synnex and Lenovo RotoVegas road trip

​Synnex and Lenovo hosted 18 resellers for an action-packed weekend adventure in RotoVegas, taking in white water rafting on the Kaituna River, as well as quad biking and dinner at Stratosfare​, overlooking Lake Rotorua at the top of Mount Ngongotaha​. Photos by Synnex.

Kiwi resellers make a splash on Synnex and Lenovo RotoVegas road trip
Show Comments