CIS BenchmarkSYSTEM HARDENING VULNERABILITY MANAGEMENT

According to security researchers with IOActive and Quarkslab, the popular confidential messaging app called Confide is riddled with security vulnerabilities.

Researchers found that this application could allow attackers to leak session information, enumerate users, and access details like emails and phone numbers.

In a recent report, IoActive states the apps notification system did not require a valid SSL server certification to communicate, ultimately leaking session information to MiTM attacks. Additionally, the app allowed unencrypted messages to be delivered without ever altering the user.

IOActive researchers found that the software was uploading file attachments before the user sent the intended message and that it allowed attackers to send malformed messages that could crash, slow, or otherwise disrupt the app.

Furthermore, the app did not use authenticated encryption, meaning confide was able to later messages in-transit. According to Bédrune, the app did not use a cryptographic integrity mechanism and the cryptographic protocol did not involve authentication. When notified of a new message, the client would request a list of unread threats from the server but had no way of verifying the origin of the message or the sender’s public keys.

Even worse, the app did not employ a mechanism to prevent against brute force attacks on user account passwords. Not surprisingly. the apps' website was also found to be plagued with vulnerabilities. Researchers discovered an arbitrary URL redirection that could facilitate social engineering attacks against its users. In addition, the website was observed reflecting incorrectly entered passwords back to the browser.

Confide has since updated its mobile and desktop applications to address some of the vulnerabilities. Confide promotes the fact they employ ‘military grade end to end encryption’, but the evidence shows there is a lot of work that needs to be done before this organization can promote themselves as a ‘confidential messenger application’.

 

 

Read this article on SecurityWeek

 

 

 

 

Products
USA Offices
New Net Technologies Ltd
Naples
Suite #10115, 9128 Strada Place
Naples, Florida, 34108
Atlanta
201 17th Street, Suite 300
Atlanta, Georgia, 30363.

Tel: 1-888-898-0674
emailUSinfo@nntws.com
UK Office
New Net Technologies Ltd
Spectrum House, Dunstable Road
Redbourn,
St Albans

Herts
AL3 7PR

Tel: 08456 585 005
Fax: 08456 122 031
emailinfo@newnettechnologies.com
NNT Newsletter
Sign up to receive our monthly newsletter covering breaking security news, how-to-tips, trends and commentary directly to your inbox.


We strongly advise NNT Customers and Partners to sign up for our Product Updates Mailing List to receive information on software updates and new product features.

Google+ Linkedin Twitter - Change Tracker Facebook rss feed YouTube
Copyright 2017, New Net Technologies Ltd. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies Ltd.
All other product, company names and trademarks are the property of their respective owners.