Vulnerabilities / Threats
7/2/2013
11:36 AM
50%
50%

Skype Bug Enables Android Lock Screen Bypass

Up to half a billion Android devices that have Skype installed are vulnerable to having their lock screen bypassed and being "attack-dialed."

 9 Android Tools That Boost Security, Privacy
9 Android Tools That Boost Security, Privacy
(click image for larger view)
More than 100 million Android devices could have their lock screens bypassed via a bug in the latest version of Skype.

That warning was sounded Monday by "Pulser," the developer administrator for XDA-Developers Forum, who said he'd tested the attack on the latest version of Skype (3.2.0.6673), which was released Monday, and multiple Android devices, including a Huawei Premia 4G, Samsung Galaxy Note 2 and Sony Xperia Z.

"The Skype for Android application appears to have a bug which permits the Android inbuilt lock screen (i.e., pattern, PIN, password) to be bypassed relatively easily, if the device is logged into Skype, and the 'attacker' is able to call the 'victim' on Skype," he said in a post to the Full Disclosure mailing list. He reported verifying the attack using two different Skype accounts and two devices, one of which was the target, which had its lock screen active and engaged.

[ Google offers tips for online security. Read Google Shares Advice On Wi-Fi Security. ]

According to Google Play, the Skype app has been installed on between 100 million and 500 million Android devices.

The attack works by sending a Skype call to the target device, Pulser explained, which will cause it to wake, ring, and display a prompt on the screen to answer or reject the call. After the call is accepted via the green answer button, the attacker must then end the call, which will cause the target device to again display the lock screen. But turning off that lock screen -- by tapping the power button once -- and then turning it back on again will then bypass the lock screen. "It will remain bypassed until the device is rebooted," Pulser explained, thus giving a would-be attacker full access to the device.

Reached by email, a press contact for Skype, which is owned by Microsoft, wasn't immediately able to comment on the bug report.

Pulser said the lock screen bypass resembles, ironically, a similar vulnerability -- discovered in April by Vietnamese information security firm Bkav -- which affected an Android app built by Skype rival Viber, which is likewise installed on over 100 million Android devices. Using the bug in Viber's Android app, which has since been patched, an attacker could send a Viber message to a target that also had the software installed, which would trigger a pop-up message. By ending the call from the attack phone, the attacker could then press the "back" button on the targeted device to bypass the lock screen and gain full access.

Smartphones and tablets running Android aren't the only devices that have suffered lock-screen-bypass vulnerabilities. Earlier this year, for example, reports surfaced of a lock screen bypass in iPhone 5, running iOS 6.1, that could be invoked by dialing and canceling an emergency call, then holding down the power button twice. Security experts reported that the vulnerability resembled a similar bug that was found in iOS 4.1 and patched in iOS 4.2.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, January 2015
To find and fix exploits aimed directly at your business, stop waiting for alerts and become a proactive hunter.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7402
Published: 2014-12-17
Multiple unspecified vulnerabilities in request.c in c-icap 0.2.x allow remote attackers to cause a denial of service (crash) via a crafted ICAP request.

CVE-2014-5437
Published: 2014-12-17
Multiple cross-site request forgery (CSRF) vulnerabilities in ARRIS Touchstone TG862G/CT Telephony Gateway with firmware 7.6.59S.CT and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) enable remote management via a request to remote_management.php,...

CVE-2014-5438
Published: 2014-12-17
Cross-site scripting (XSS) vulnerability in ARRIS Touchstone TG862G/CT Telephony Gateway with firmware 7.6.59S.CT and earlier allows remote authenticated users to inject arbitrary web script or HTML via the computer_name parameter to connected_devices_computers_edit.php.

CVE-2014-7170
Published: 2014-12-17
Race condition in Puppet Server 0.2.0 allows local users to obtain sensitive information by accessing it in between package installation or upgrade and the start of the service.

CVE-2014-7285
Published: 2014-12-17
The management console on the Symantec Web Gateway (SWG) appliance before 5.2.2 allows remote authenticated users to execute arbitrary OS commands by injecting command strings into unspecified PHP scripts.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.