HTTPS vulnerability exposes 1,500 iOS apps to security vulnerabilities

HTTPS vulnerability exposes 1,500 iOS apps to security vulnerabilities

SourceDNA, an app analytics service company, released a report on Monday that about 1,500 iOS apps have "HTTPS-crippling" vulnerabilities, which allow hackers to intercept users' encrypted information, such as passwords, bank account numbers or other highly sensitive information.

SourceDNA estimates that more than 2 million users have installed these potentially unsafe apps, such as Citrix OpenVoice Audio Conferencing, Alibaba.com's mobile app, KYBankAgent 3.0 and Revo Restaurant Point of Sale.

The vulnerability exists in early versions of AFNetworking. AFNetworking is an open source network development framework that allows developers to add network functions to their applications. Although the latest 2.5.2 version fixed the vulnerability three weeks ago, at least 1,500 iOS applications are still using the vulnerable 2.5.1 version.

To exploit this vulnerability, hackers only need to use the WiFi network of an Internet cafe or other place to monitor the vulnerable iOS device, and then use a fake Secure Sockets Layer certificate to launch an attack. Under normal circumstances, this fake certificate will be immediately detected. However, due to a logical error in the 2.5.1 version code, it does not verify the fake certificate and is therefore regarded as a legitimate certificate.

SourceDNA initially withheld the names of the affected apps to give developers time to update them, but now it has provided a search tool that allows iOS users to search by developer name.

Last month, Apple fixed the FREAK security vulnerability that affected iOS. The vulnerability was a remnant of a 1990s U.S. law that restricted the export of RSA encryption keys and is still supported by many browsers.

<<:  What detours might you take in the process of learning programming?

>>:  Foxconn starts selling used iPhones every Wednesday at 12:00

Recommend

Three modes of mobile phone system development by Apple, Google and Microsoft

Since people entered the mobile Internet era to t...

Community operation: How to obtain accurate user groups?

To do community operation, you must learn how to ...

Cooperative SEO training: Why can’t I rank high after doing so much?

When we do website optimization, we must combine ...

How does a good operator find your target users?

Taking the growth of Internet products as an examp...

Perfect Diary’s private domain traffic method!

The article provides a detailed analysis of the t...

What is a mud volcano?

Mud volcano is a kind of "fake volcano"...

Wandering Emotional Captain "Specializing in Love Nuclear Weapons"

Course Catalog 1. How to quickly become a high-qu...

New energy vehicles: Let cars break up with gasoline?

As an important means of production and transport...

Tips for making popular short videos!

I have always wanted to interview Zhu Feng to tal...