Hundreds of iOS apps vulnerable to HTTPS-based FREAK attack

Posted:
in iPhone edited March 2015
A report on Tuesday points out that a recent SSL/TLS vulnerability dubbed "FREAK" is not restricted to Web browsers and can affect mobile apps, leaving hundreds of iOS apps open to potential man-in-the-middle attacks.




Security researchers at FireEye recently went through thousands of iOS and Android apps and found that while a bulk are not vulnerable to the "FREAK" (Factoring RSA Export Keys) attack, a significant number are, reports Ars Technica.

Specifically, 771 of the top 14,079 apps in the iOS App Store are open to attack, while 1,288 Android apps with one million plus downloads are similarly vulnerable. According to researchers, vulnerable apps use affected crypto libraries to connect to servers with weak encryption keys, which are apparently still in use today.

"As an example, an attacker can use a FREAK attack against a popular shopping app to steal a user's login credentials and credit card information," FireEye researchers Yulong Zhang, Zhaofeng Chen, Hui Xue, and Tao Wei said. "Other sensitive apps include medical apps, productivity apps and finance apps."

Following FREAK's discovery, Apple issued patches for OS X, iOS and Apple TV, though apps running on hardware without the latest security update may still be exposed. FireEye said seven of the 771 iOS apps affected are even vulnerable with Apple's patch installed.

Discovered earlier in March, the FREAK exploit takes advantage of legacy support for decades-old -- and deprecated -- SSL/TLS encryption protocols. Malicious users can force an encryption downgrade to intercept secure communications and harvest sensitive data.
«1

Comments

  • Reply 1 of 21
    fallenjtfallenjt Posts: 4,054member

    Here you go. Let the trolls begin.

  • Reply 2 of 21

    The nice thing is that iOS itself is still secure.

  • Reply 3 of 21
    ecatsecats Posts: 272member
    This is why you use the built-in libraries instead of rolling your own.

    Here's to placing a small bet that the bulk of the vulnerable apps were written using craptastic cross-platform tools instead of native development.
  • Reply 4 of 21
    boredumbboredumb Posts: 1,418member
    Quote:

    Originally Posted by TheWhiteFalcon View Post

     

    The nice thing is that iOS itself is still secure.


    It'll be nice if media outlets report it in such a way that the less-computer-literate

    aren't encouraged to feel ?Pay is somehow compromised...

  • Reply 5 of 21
    dewmedewme Posts: 5,356member
    Recommend reading the linked article. Of the 771 vulnerable iOS apps identified, only 7 (yes seven) of those apps are vulnerable if you are running iOS 8.2 or newer on your device.

    Users should always put these sensationalist seeking articles in the proper perspective. These are vulnerabilities, which does not imply that someone is actually engaged in exploiting these vulnerabilities. Plus, the article also adds a caveat that to be exploited the servers have to be using weak SSL encryption. What percentage of servers are we talking about and how much does that now lower the 7 number to something even smaller. When all is said and done I'd bet that more iPhones get dropped in toilets than get impacted by this vulnerability. I expect that there are far worse vulnerabilities in the NSA's cache of cyberweapons that make this one seem insignificant. I'm not going to lose any sleep over this one.

    The article doesn't give quantifiable data that indicates the percentage of vulnerable apps using a measurable scale that applies equally to iOS and Android. Not sure why, but raises doubts about their credibility.
  • Reply 6 of 21
    dasanman69dasanman69 Posts: 13,002member
    dewme wrote: »
    Recommend reading the linked article. Of the 771 vulnerable iOS apps identified, only 7 (yes seven) of those apps are vulnerable if you are running iOS 8.2 or newer on your device.

    Users should always put these sensationalist seeking articles in the proper perspective. These are vulnerabilities, which does not imply that someone is actually engaged in exploiting these vulnerabilities.

    The article doesn't give quantifiable data that indicates the percentage of vulnerable apps using a measurable scale that applies equally to iOS and Android. Not sure why, but raises doubts about their credibility.

    Funny how nobody ever says this when it's a competing OS.
  • Reply 7 of 21
    ecats wrote: »
    This is why you use the built-in libraries instead of rolling your own.

    Here's to placing a small bet that the bulk of the vulnerable apps were written using craptastic cross-platform tools instead of native development.

    Exactly.

    I hate cross-platform apps with a vengeance.
  • Reply 8 of 21
    foggyhillfoggyhill Posts: 4,767member
    Quote:
    Originally Posted by AppleInsider View Post



    A report on Tuesday points out that a recent SSL/TSL vulnerability dubbed "FREAK" is not restricted to Web browsers and can affect mobile apps, leaving hundreds of iOS apps open to potential man-in-the-middle attacks.

     





    Security researchers at FireEye recently went through thousands of iOS and Android apps and found that while a bulk are not vulnerable to the "FREAK" (Factoring RSA Export Keys) attack, a significant number are, reports Ars Technica.



    Specifically, 771 of the top 14,079 apps in the iOS App Store are open to attack, while 1,288 Android apps with one million plus downloads are similarly vulnerable. According to researchers, vulnerable apps use affected crypto libraries to connect to servers with weak encryption keys, which are apparently still in use today.



    "As an example, an attacker can use a FREAK attack against a popular shopping app to steal a user's login credentials and credit card information," FireEye researchers Yulong Zhang, Zhaofeng Chen, Hui Xue, and Tao Wei said. "Other sensitive apps include medical apps, productivity apps and finance apps."



    Following FREAK's discovery, Apple issued patches for OS X, iOS and Apple TV, though apps running on hardware without the latest security update may still be exposed. FireEye said seven of the 771 iOS apps affected are even vulnerable with Apple's patch installed.



    Discovered earlier in March, the FREAK exploit takes advantage of legacy support for decades-old -- and deprecated -- SSL/TSL encryption protocols. Malicious users can force an encryption downgrade to intercept secure communications and harvest sensitive data.

     

    This is a ridiculously easy fix. Don't allow downgrade even when the site asks for it. All the apps that use system libraries are fixed by going to 8.2.

     

    Also, some of those apps are theoretically vulnerable, but not really vulnerable, since if the end point doesn't allow a downgrade, they're safe; so if you're connecting to a known site that got configured to too not allow the downgrade (which should be the case, since otherwise this site would not be able to connect with a patched app) you're safe unless someone spoofs that site completely. If they do that, they probably don't need that bug anyway to get you to give them access.

     

    What remains are apps that allow the downgrade but can connect to any web site. These would be the ones most vulnerable. I'd say they're probably a very small number. Keeping to trusted sites is one way to avoid this issue; but, the devellopper can avoid this issue by doing the simple fix.

  • Reply 9 of 21
    yojimbo007yojimbo007 Posts: 1,165member
    Fud
  • Reply 10 of 21
    foggyhillfoggyhill Posts: 4,767member
    Quote:
    Originally Posted by dasanman69 View Post





    Funny how nobody ever says this when it's a competing OS.

     

    Because when you have crap OS security like in Android which is a malware haven, even comparing its issues to this, an application level bug that's fixed in 8.2 in anyone using standard IOS libraries, means that person has no understanding of security at all and is just having their jollies because Apple was mentioned somewhere in the headline. This is especially funny since this bug had a even bigger effect on Android apps since most won't even get the fix.

     

    If an application transmits your password in the clear to a web site, which is an extreme form of what's happening here, not sure how this is IOS's or Apple's fault. The issue is well known. If the app maker is too lazy to do the quick fix, what can Apple do? Pull the app? Is Apple responsible for every security bug in the apps in the app store?

     

    This fallback was part of the initial standard, it is not even a bug in the traditional sense of the word; more a broken as designed issue. Faster computers have allowed this issue to slowly emerge over time.

  • Reply 11 of 21

    What happened to proper reporting.   The title should say something like "Upgrade to iOS 8.2 NOW and you will only have 7 apps vulnerable to FREAK attack versus hundreds"

  • Reply 12 of 21
    mstonemstone Posts: 11,510member
    Quote:
    Originally Posted by ECats View Post



    This is why you use the built-in libraries instead of rolling your own.



    Here's to placing a small bet that the bulk of the vulnerable apps were written using craptastic cross-platform tools instead of native development.

    If they are using https:// then I think they have to use WebKit or the app will not be accepted.

     

    Quote:
    Originally Posted by DewMe View Post



    Plus, the article also adds a caveat that to be exploited the servers have to be using weak SSL encryption. What percentage of servers are we talking about and how much does that now lower the 7 number to something even smaller. 

    There is no direct relationship between the number of unpatched servers and the 7 really bad apps. The number 7 does not get lowered.

  • Reply 13 of 21
    mstonemstone Posts: 11,510member
    Quote:
    Originally Posted by Skillquest View Post

     

    What happened to proper reporting.   The title should say something like "Upgrade to iOS 8.2 NOW and you will only have 7 apps vulnerable to FREAK attack versus hundreds"


    Many people are using old hardware and can't upgrade to the latest OS.

  • Reply 14 of 21
    dasanman69dasanman69 Posts: 13,002member
    foggyhill wrote: »
    Because when you have crap OS security like in Android which is a malware haven, even comparing its issues to this, an application level bug that's fixed in 8.2 in anyone using standard IOS libraries, means that person has no understanding of security at all and is just having their jollies because Apple was mentioned somewhere in the headline.

    If an application transmits your password in the clear to a web site, which is an extreme form of what's happening here, not sure how this is IOS's or Apple's fault. The issue is well known. If the app maker is too lazy to do the quick fix, what can Apple do? Pull the app? Is Apple responsible for every security bug in the apps in the app store?

    This fallback was part of the initial standard, it is not even a bug in the traditional sense of the word; more a broken as designed issue. Faster computers have allowed this issue to slowly emerge over time.

    I don't see anyone blaming Apple. This vulnerability is affecting Android as well. I think you're reading just a little too much into it.
  • Reply 15 of 21
    mstonemstone Posts: 11,510member
    Quote:


    Originally Posted by foggyhill View Post



    If an application transmits your password in the clear to a web site, which is an extreme form of what's happening here, 



    That is not what is happening here.

     

    It takes three things to accomplish a hack with this exploit:

     

    1) Unpatched server

    2) Man in the middle

    3) Old browser

     

    It is completely platform agnostic.

     

    The fact that the credentials are still being transferred with SSL means it is not a password in the clear, just old SSL.

  • Reply 16 of 21
    foggyhillfoggyhill Posts: 4,767member
    Quote:

    Originally Posted by foggyhill View Post

     

     

    Because when you have crap OS security like in Android which is a malware haven, even comparing its issues to this, an application level bug, means that person has no understanding of security at all and is just having their jollies because Apple was mentioned somewhere in the headline.

     

    If an application transmits your password in the clear to a web site, which is an extreme form of what's happening here, not sure how this is IOS's or Apple's fault. The issue is well known. If the app maker is too lazy to do the quick fix, what can Apple do? Pull the app? Is Apple responsible for every security bug in the apps in the app store?

     

    This fallback was part of the initial standard, it is not even a bug in the traditional sense of the word; more a broken as designed issue. Faster computers have allowed this issue to slowly emerge over time.


     

    Quote:

    Originally Posted by mstone View Post

     

    That is not what is happening here.

     

    It takes three things to accomplish a hack with this exploit:

     

    1) Unpatched server

    2) Man in the middle

    3) Old browser

     

    It is completely platform agnostic.

     

    The fact that the credentials are still being transferred with SSL means it is not a password in the clear, just old SSL.


     

    I know that this is not what's happening here. I was saying that using this bit of code, was similar in result (in spirit, not reality) to sending in the clear. Maybe that wasn't clear in my sentence.

     

    The man in the middle here intercepts the initial handshake and replaces it with one asking for a security downgrade, which the missconfigured web server allows, the key is broken, "mayhem" issues ;-).

  • Reply 17 of 21
    adonissmuadonissmu Posts: 1,776member

    You don't think it's prudent to list those 7 apps on this Apple blog? 

  • Reply 18 of 21
    gatorguygatorguy Posts: 24,212member
    adonissmu wrote: »
    You don't think it's prudent to list those 7 apps on this Apple blog? 
    There's no doubt more than 7 in the App Store. This particular review looked at fewer than 15 thousand of the over 1.2 million available.
  • Reply 19 of 21
    dewmedewme Posts: 5,356member
    Quote:


     There is no direct relationship between the number of unpatched servers and the 7 really bad apps. The number 7 does not get lowered.


     

    Hmm. According to the article some of the vulnerable apps only connect to a single dedicated server and are only vulnerable if the server is allowing weak encryption keys. If the server does not allow weak keys I suppose that would break the app, so I guess the number of bad apps stays at 7 but the threat of data interception is reduced due to app breakage. In any case these are small numbers and small percentages and Apple has an active patching model to reduce the vulnerability quickly compared to other carrier dependent platforms.

  • Reply 20 of 21
    adonissmu wrote: »
    You don't think it's prudent to list those 7 apps on this Apple blog? 

    The app programmers will likely upgrade their apps ASAP... no sense having the world stop buying their apps long after the app's been fixed.
Sign In or Register to comment.