WiFi Broadcasts in Android OS Leaking sensitive data from a user’s Android device and the details about all the application that running on the user’s device.
All the version of Android running devices is affected by this vulnerability including Amazon’s FireOS for the Kindle.
It leaks Sensitive information such as WiFi network name, BSSID, local IP addresses, DNS server information and the MAC address.
Other than this, attackers need some extra permission to access the rest of the information in the vulnerable Android devices.
Since the MAC address unique for every Android mobile and its tied to hardware thus helps to track any Android device.
Apart from this, network name and BSSID can be used to geolocate users via a lookup against a database of BSSID such as WiGLE or SkyHook.
Android using service called “Intents” for interprocess communication, also in order to send a message by application or OS that can be listed by other applications “Intent” is mainly used by broadcast.
Also, it restricts who is allowed to read such messages or mask sensitive data. along with this Another security mechanism present in the Android is permissions that used to protect the privacy of users.
There are 2 intents used by Android OS broadcasts about WiFi connection and the WiFi network interface.
According to nightwatch cybersecurity, on Android versions 6.0 and later, the real MAC address of the device is no longer available via APIs and will always return the address “02:00:00:00:00:00”. However, an application listening for system broadcasts does not need these permissions thus allowing this information to be captured without the knowledge of the user and the real MAC address being captured even on Android 6 or higher.
In this behavior has been confirmed in multiple types of hardware and Android versions. For Android device users, you can replicate these issues as follows:
This is has been reported to Google and they fixed the vulnerability in Android P / 9. The vendor does not plan to fix prior versions of Android. Users are encouraged to upgrade to Android P / 9 or later.
Android ID # 77286245
CVE ID: CVE-2018-9489
Google Bug # 77236217
GitHub: Internal Broadcasts Monitor
A sophisticated cyber espionage campaign leveraging the newly identified BRICKSTORM malware variants has targeted European…
A recent report by Cyble has shed light on the evolving tactics of hacktivist groups,…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released nine new advisories detailing severe…
Email security solutions are critical for protecting organizations from the growing sophistication of cyber threats…
A new form of phishing attack is making waves among job seekers, as cybercriminals exploit…
Security Operations Centers (SOCs) are facing a mounting crisis: alert fatigue. As cyber threats multiply…