Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Email Security

Vulnerability in Network Provisioning Affects Majority of All Android Phones

An SMS phishing attack against many modern Android phones could route all internet traffic through a proxy controlled by the attacker. The problem lies in weak (sometimes non-existent) authentication for over-the-air (OTA) provisioning.

An SMS phishing attack against many modern Android phones could route all internet traffic through a proxy controlled by the attacker. The problem lies in weak (sometimes non-existent) authentication for over-the-air (OTA) provisioning.

OTA provisioning is used by network operators to deploy network-specific settings to new phones on the network. It is also used by corporations to deploy, for example, company email server addresses to employee devices. The industry standard for OTA provisioning is the Open Mobile Alliance Client Provisioning (OMA CP), which includes limited authentication; but an OTA recipient cannot verify whether the new settings have come from the genuine network operator, or an imposter.

Researchers from Check Point have found that this weak authentication can be used to ‘phish’ phone users into accepting false settings. The attack can be used against a number of Android phone manufacturers, including Samsung, Huawei, LG and Sony. In 2018, these four manufacturers provided more than 50% of all Android phones.

Check Point has reported its findings to all four companies. Samsung fixed the issue in its May security maintenance release. LG released a fix in July. Huawei plans to include fixes in the next generation of Mate series or P series smartphones. However, the researchers note that “Sony refused to acknowledge the vulnerability, stating that their devices follow the OMA CP specification. OMA is tracking this issue as OPEN-7587.”

It is worth noting that the basic Android distribution does not handle OMA CP, but that many of the vendor implementations add the capability. Any Android phone that accepts OTA provisioning is vulnerable to this attack.

All that is required for is a GSM modem (“either a $10 USB dongle, or a phone operating in modem mode” used to send the false OTA message), and a simple script to compose the OMA CP. This lends itself to spear-phishing with a preceding text message designed to deceive the target, or bulk phishing in the expectation that at least some of the recipients will accept the CP (client provisioning) without challenging its authenticity.

With Samsung phones, there is no authenticity check available. The recipient need only accept the CP for the new settings to be installed. For the other three manufacturers, an attacker in possession of the phones’ International Mobile Subscriber Identity (IMSI) number can mount an attack as effective as that against Samsung. IMSI is a unique identifier for every phone on a network. It is described as ‘pseudo-confidential’, but can be obtained from forward and reverse IMSI lookups (mobile number to IMSI and vice versa) that are cheaply available via commercial suppliers.

It can also be obtained via any Android app with the permission: ‘android.permission.READ_PHONE_STATE’. “Over a third of all Android apps released in the last three years already require this permission, so it wouldn’t raise any suspicion,” note the researchers.

Advertisement. Scroll to continue reading.

With that IMSI number, the CP is automatically authenticated, and the user need only accept the suggestion for the settings to be changed. There is no indication in the CP notice of what settings will be changed, nor is the sender of the CP identified. However, the name of the genuine network provider can be included in the fraudulent message, making it appear to be genuine.

Where there is no IMSI number, or it cannot be obtained, the target can still be phished. This could be done with two messages. The first would purport to be from the user’s network operator and would ask the victim to accept a PIN-protected OMA CP and would provide the PIN. The second message would be the fraudulent OMA CP authenticated with the provided PIN.

If successful, an attacker can divert all the victims’ emails through his own server and have constant and covert access to their content. “Given the popularity of Android devices, this is a critical vulnerability that must be addressed,” said Slava Makkaveev, security researcher at Check Point. “Without a stronger form of authentication, it is easy for a malicious agent to launch a phishing attack through over-the-air provisioning. When the user receives an OMA CP message, they have no way to discern whether it is from a trusted source. By clicking ‘accept’, they could very well be letting an attacker into their phone.”

Related: Over-the-Air Update Mechanism Exposes Millions of Android Devices 

Related: Mobile Malware and Mobile Attackers are Getting More Sophisticated 

Related: ‘Tis the Season for Mobile Threats 

Related: Government Surveillance Under Fire: What You Need to Know 

Written By

Kevin Townsend is a Senior Contributor at SecurityWeek. He has been writing about high tech issues since before the birth of Microsoft. For the last 15 years he has specialized in information security; and has had many thousands of articles published in dozens of different magazines – from The Times and the Financial Times to current and long-gone computer magazines.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Shay Mowlem named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

Shaun Khalfan has joined payments giant PayPal as SVP, CISO.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Cloud Security

Cloud security researcher warns that stolen Microsoft signing key was more powerful and not limited to Outlook.com and Exchange Online.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.