Vulnerabilities / Threats
7/2/2013
11:36 AM
50%
50%

Skype Bug Enables Android Lock Screen Bypass

Up to half a billion Android devices that have Skype installed are vulnerable to having their lock screen bypassed and being "attack-dialed."

 9 Android Tools That Boost Security, Privacy
9 Android Tools That Boost Security, Privacy
(click image for larger view)
More than 100 million Android devices could have their lock screens bypassed via a bug in the latest version of Skype.

That warning was sounded Monday by "Pulser," the developer administrator for XDA-Developers Forum, who said he'd tested the attack on the latest version of Skype (3.2.0.6673), which was released Monday, and multiple Android devices, including a Huawei Premia 4G, Samsung Galaxy Note 2 and Sony Xperia Z.

"The Skype for Android application appears to have a bug which permits the Android inbuilt lock screen (i.e., pattern, PIN, password) to be bypassed relatively easily, if the device is logged into Skype, and the 'attacker' is able to call the 'victim' on Skype," he said in a post to the Full Disclosure mailing list. He reported verifying the attack using two different Skype accounts and two devices, one of which was the target, which had its lock screen active and engaged.

[ Google offers tips for online security. Read Google Shares Advice On Wi-Fi Security. ]

According to Google Play, the Skype app has been installed on between 100 million and 500 million Android devices.

The attack works by sending a Skype call to the target device, Pulser explained, which will cause it to wake, ring, and display a prompt on the screen to answer or reject the call. After the call is accepted via the green answer button, the attacker must then end the call, which will cause the target device to again display the lock screen. But turning off that lock screen -- by tapping the power button once -- and then turning it back on again will then bypass the lock screen. "It will remain bypassed until the device is rebooted," Pulser explained, thus giving a would-be attacker full access to the device.

Reached by email, a press contact for Skype, which is owned by Microsoft, wasn't immediately able to comment on the bug report.

Pulser said the lock screen bypass resembles, ironically, a similar vulnerability -- discovered in April by Vietnamese information security firm Bkav -- which affected an Android app built by Skype rival Viber, which is likewise installed on over 100 million Android devices. Using the bug in Viber's Android app, which has since been patched, an attacker could send a Viber message to a target that also had the software installed, which would trigger a pop-up message. By ending the call from the attack phone, the attacker could then press the "back" button on the targeted device to bypass the lock screen and gain full access.

Smartphones and tablets running Android aren't the only devices that have suffered lock-screen-bypass vulnerabilities. Earlier this year, for example, reports surfaced of a lock screen bypass in iPhone 5, running iOS 6.1, that could be invoked by dialing and canceling an emergency call, then holding down the power button twice. Security experts reported that the vulnerability resembled a similar bug that was found in iOS 4.1 and patched in iOS 4.2.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-4440
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 generates weak non-tty passwords, which makes it easier for context-dependent attackers to guess the password via a brute-force attack.

CVE-2013-4442
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 uses weak pseudo generated numbers when /dev/urandom is unavailable, which makes it easier for context-dependent attackers to guess the numbers.

CVE-2014-2026
Published: 2014-12-19
Cross-site scripting (XSS) vulnerability in the search functionality in United Planet Intrexx Professional before 5.2 Online Update 0905 and 6.x before 6.0 Online Update 10 allows remote attackers to inject arbitrary web script or HTML via the request parameter.

CVE-2014-2716
Published: 2014-12-19
Ekahau B4 staff badge tag 5.7 with firmware 1.4.52, Real-Time Location System (RTLS) Controller 6.0.5-FINAL, and Activator 3 reuses the RC4 cipher stream, which makes it easier for remote attackers to obtain plaintext messages via an XOR operation on two ciphertexts.

CVE-2014-5212
Published: 2014-12-19
Cross-site scripting (XSS) vulnerability in nds/search/data in iMonitor in Novell eDirectory before 8.8 SP8 Patch 4 allows remote attackers to inject arbitrary web script or HTML via the rdn parameter.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.