Thursday, April 10, 2025
HomeAndroidWiFi Broadcasts in All Version of Android OS Leaking Sensitive Data Including...

WiFi Broadcasts in All Version of Android OS Leaking Sensitive Data Including IP Addresses, BSSID, WiFi Network Name

Published on

SIEM as a Service

Follow Us on Google News

WiFi Broadcasts in Android OS Leaking sensitive data from a user’s Android device and the details about all the application that running on the user’s device.

All the version of Android running devices is affected by this vulnerability including  Amazon’s FireOS for the Kindle.

It leaks Sensitive information such as WiFi network name, BSSID, local IP addresses, DNS server information and the MAC address.

- Advertisement - Google News

Other than this, attackers need some extra permission to access the rest of the information in the vulnerable Android devices.

Since the MAC address unique for every Android mobile and its tied to hardware thus helps to track any Android device.

Apart from this, network name and BSSID can be used to geolocate users via a lookup against a database of BSSID such as WiGLE or SkyHook.

WiFi Broadcasts Vulnerability Analysis

Android using service called  “Intents” for interprocess communication, also in order to send a message by application or OS that can be listed by other applications  “Intent” is mainly used by broadcast.

Also, it restricts who is allowed to read such messages or mask sensitive data. along with this Another security mechanism present in the Android is permissions that used to protect the privacy of users.

There are 2 intents used by Android OS broadcasts about WiFi connection and the WiFi network interface.

According to nightwatch cybersecurity, on Android versions 6.0 and later, the real MAC address of the device is no longer available via APIs and will always return the address “02:00:00:00:00:00”. However, an application listening for system broadcasts does not need these permissions thus allowing this information to be captured without the knowledge of the user and the real MAC address being captured even on Android 6 or higher.

In this behavior has been confirmed in multiple types of hardware and Android versions. For Android device users, you can replicate these issues as follows:

  1. Install the “Internal Broadcasts Monitor” application developed by Vilius Kraujutis from Google Play.
  2.  Open the application and tap “Start” to monitor broadcasts.
  3.  Observe system broadcasts, specifically “android.net.wifi.STATE_CHANGE” and “android.net.wifi.p2p.THIS_DEVICE_CHANGED”.

This is has been reported to Google and they fixed the vulnerability in Android P / 9. The vendor does not plan to fix prior versions of Android. Users are encouraged to upgrade to Android P / 9 or later.

References

Android ID # 77286245
CVE ID: CVE-2018-9489
Google Bug # 77236217
GitHub: Internal Broadcasts Monitor

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

PAN-OS DoS Vulnerability Allows Attackers to Force Repeated Firewall Reboots

A newly disclosed denial-of-service (DoS) vulnerability in Palo Alto Networks’ PAN-OS software enables attackers...

Linux Firewall IPFire 2.29 Launches with Post-Quantum Encryption and System Enhancements

The open-source Linux firewall solution, IPFire, has officially released its latest version, IPFire 2.29 - Core...

‘RemoteMonologue’ New Red Team Technique Exploits DCOM To Steal NTLM Credentials Remotely

A sophisticated new red team technique dubbed "RemoteMonologue" has emerged, enabling attackers to remotely...

OpenSSH 10.0 Released: New Protocol Changes and Key Security Improvements

The OpenSSH team has announced the release of OpenSSH 10.0 on April 9, marking an important...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

PAN-OS DoS Vulnerability Allows Attackers to Force Repeated Firewall Reboots

A newly disclosed denial-of-service (DoS) vulnerability in Palo Alto Networks’ PAN-OS software enables attackers...

PAN-OS Command Injection Flaw Lets Hackers Execute Arbitrary Code Remotely

Palo Alto Networks has disclosed a medium-severity vulnerability (CVE-2025-0127) in its PAN-OS software, enabling...

Windows Active Directory Vulnerability Enables Unauthorized Privilege Escalation

Microsoft has urgently patched a high-risk security vulnerability (CVE-2025-29810) in Windows Active Directory Domain...