A serious vulnerability in the privacy-focused Blackphone could have been exploited by a remote attacker to execute arbitrary code on a targeted device, a researcher revealed on Tuesday.
According to Mark Dowd, director and founder of Australia-based Azimuth Security, the vulnerability existed in Silent Text, the Blackphone messaging application developed by Silent Circle. The app, which allows users to send text messages and files securely, is also available for other types of smartphones running Android and iOS.
Dowd identified a memory corruption (type confusion) vulnerability that allowed an attacker to execute arbitrary code with the privileges of the messaging application. The flaw could have been leveraged by a hacker to decrypt messages, take over Silent Circle accounts, access contacts, collect location information, and write data to external storage. An attacker could have also executed a privilege escalation exploit that would enable him to take complete control of the targeted handset.
When users send messages or files through Silent Text, the information is delivered over an encrypted channel that uses the Silent Circle Instant Message Protocol (SCIMP).
“SCIMP provides end-to-end encryption, so that data exchanged in a given conversation cannot be decrypted by an eavesdropping third party (including Silent Circle),” Dowd explained in a blog post. “The SCIMP implementation supplied with SilentText contains a type confusion vulnerability, that allows an attacker to directly overwrite a pointer in memory (either partially or in full), which when successfully exploited can be used to gain remote, unauthenticated access to the vulnerable device.”
An attacker could have exploited this vulnerability simply by knowing the targeted user’s Silent Circle ID or phone number. The researcher highlighted that a malicious actor did not necessarily need to trick the victim into contacting him for the attack to work, although this is also an attack vector.
Fortunately, the vulnerability has been addressed by Blackphone and Silent Circle.
In September, SGP Technologies, the joint venture between Geeksphone and Silent Circle responsible for the development of Blackphone, announced the launch of a bug bounty program designed to encourage researchers to contribute to making Blackphone and Silent Circle’s communications services more secure.
“We have high expectations for security and privacy. In order to deliver on our expectations we must continually build a strong relationship with the security research community,” Daniel Ford, CSO of SGP Technologies, said at the time.
A detailed technical description of the Blackphone vulnerability is available on Azimuth Security’s blog.

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- ChatGPT Hallucinations Can Be Exploited to Distribute Malicious Code Packages
- AntChain, Intel Create New Privacy-Preserving Computing Platform for AI Training
- Several Major Organizations Confirm Being Impacted by MOVEit Attack
- Verizon 2023 DBIR: Human Error Involved in Many Breaches, Ransomware Cost Surges
- Google Patches Third Chrome Zero-Day of 2023
- Ransomware Group Used MOVEit Exploit to Steal Data From Dozens of Organizations
- Cybersecurity M&A Roundup: 36 Deals Announced in May 2023
- In Other News: Government Use of Spyware, New Industrial Security Tools, Japan Router Hack
Latest News
- OWASP’s 2023 API Security Top 10 Refines View of API Risks
- Android’s June 2023 Security Update Patches Exploited Arm GPU Vulnerability
- ChatGPT Hallucinations Can Be Exploited to Distribute Malicious Code Packages
- Blumira Raises $15 Million for SMB-Tailored XDR Platform
- Microsoft Will Pay $20M to Settle US Charges of Illegally Collecting Children’s Data
- KeePass Update Patches Vulnerability Exposing Master Password
- AntChain, Intel Create New Privacy-Preserving Computing Platform for AI Training
- Keep Aware Raises $2.4M to Eliminate Browser Blind Spots
