airdroid100696922orig

Severe AirDroid vulnerability threatens tens of millions of Android users

Popular remote management utility AirDroid has attracted tens of millions of users with the lure of sharing the messages and files on their phones with their PCs, but you might want to think twice about firing it up today. Mobile security firm Zimperium has published a report detailing several major vulnerabilities that threaten to hijack your device.

The security issue—which still exists in the latest 4.0.1 release, according to Zimperium—is related to “insecure communication channels” that “send the same data used to authenticate the device to their statistics server.” That means someone on the same network could use a simple man-in-the-middle attack to intercept the user’s email address and password associated with AirDroid. Furthermore, the hacker could then download malicious updates to the app that in turn give them full control over the device.

Zimperium notes that they contacted Sand Studio about the vulnerability back in May and has been in communication with the company through last month’s release of version 4.0. However, the firm warns that the vulnerability has not been patched and advises users to uninstall AirDroid until a fix is available.

Update, 11:45am: Betty Chen, chief marketing officer at Sand Studio, told Greenbot that the company is “indeed working on the solution and it should be expected to start to roll out within next two weeks.” She attributed the lack of prior action to “miscommunication” between Sand Studio and Zimperium.

The impact on you at home:  Android users understand that security vulnerabilities are a fact of life—just this week the Gooligan exploit was found to have breached more than a million Google accounts—but generally they originate outside of the Play Store. AirDroid is a popular utility used by as many as 50 million Android users, and the developers have an obligation to their users to keep the app as safe and secure as possible. Earlier this year, the company quickly patched a similar bug exposed by Check Point, but this time around it appears Sand Studio has known about this issue for more than six months and has done nothing to correct it.

IDG Insider

PREVIOUS ARTICLE

« Researchers find a way bypass the iOS activation lock

NEXT ARTICLE

Remote management app exposes millions of Android users to hacking »
author_image
IDG News Service

The IDG News Service is the world's leading daily source of global IT news, commentary and editorial resources. The News Service distributes content to IDG's more than 300 IT publications in more than 60 countries.

  • Mail

Poll

Do you think your smartphone is making you a workaholic?