Three months after the vulnerabilities were discovered, the developers still haven’t patched them. Strafak wrote in his blog that only a few of them took steps to fix the problems with the code of their apps, including the creators of HipChat and Foxit PDF. Most other developers did not respond to the SSG warning. Among them are banking clients Emirates NBD, 21st Century Insurance, Think Mutual Bank, and Space Coast Credit Union. The Dolphin browser, the Diabetes in Check app for diabetics, and a program that allows Indiana residents to vote are also listed as vulnerable.
" out by anyone within range of a Wi-Fi network while you sweden whatsapp data using your device. Attacks are possible in public places or even in your home if the attacker can get close enough," Strafak said. The total number of downloads of vulnerable iOS apps, according to SSG, is 18 million, but there is no evidence yet that hackers are using users' personal data.
"Apple cannot close the vulnerability in the transport protocol, because it will prevent some iOS applications from receiving certificates for their own connections. It will also be impossible to verify the validity of third-party certificates required for intranet connections within corporate networks," Strafak says.
Thus, the responsibility for fixing vulnerabilities in an app lies solely with its developer. Strafak advises developers to be careful when changing the behavior of apps or using network code. Given that hackers can exploit the vulnerability primarily on Wi-Fi networks, end users who work with sensitive personal data in apps should disable Wi-Fi in the iPhone or iPad settings before using the vulnerable app. It is much more difficult to steal personal data on a cellular network.
These attacks can be carried
-
- Posts: 537
- Joined: Mon Dec 23, 2024 3:13 am