Attacks could steal HTC Wi-Fi codes with malicious app

Share this article:

Some HTC mobile devices, running on the Android operating system, contain a software bug that could allow attackers to steal a user's Wi-Fi credentials and network name, known as an SSID.

According to a vulnerability note posted Wednesday by US-CERT, the flaw can be exploited if users have installed applications on affected phones that contain certain permissions.

"There is an issue in certain HTC builds of Android that can expose the user's 802.1X password to any program with the 'android.permission.ACCESS_WIFI_STATE' permission," wrote researcher Bret Jordan, who discovered the weakness with Chris Hessing. "When paired with the 'android.permission.INTERNET' permission, an app could easily send usernames and passwords to a remote server for collection."

Nine models are affected, according to US-CERT. The myTouch 3G and Nexus One are not impacted by the vulnerability.

HTC made a fix available earlier this week, and some phones have have been automatically updated, while other require the patch to be installed manually. Android maker Google, meanwhile, has tested all of the applications in its marketplace to ensure none are trying to take advantage of the vulnerability, Jordan said.

An HTC spokesperson did not respond to a request for comment from SCMagazine.com.

The Taiwanese company, an emerging player in the smartphone and tablet market, had to squash a similar issue last year,

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

Email promises free pizza, ensnares victims in Asprox botnet instead

Email promises free pizza, ensnares victims in Asprox ...

Cloudmark came upon an email that offers free pizza, but clicking on the link to get the coupon ends with victims being ensnared in a botnet.

Report: most orgs lacking in response team, policies to address cyber incidents

In its Q3 threat intelligence report, Solutionary learned that 75 percent of organizations it assisted had no response team or policies and procedures to address cyber incidents.

Flash redirect campaign impacts Carnegie Mellon page, leads to Angler EK

Flash redirect campaign impacts Carnegie Mellon page, leads ...

Malwarebytes found that, since early July, thousands of sites had been targeted in the campaign.