Home Security Numerous Android Antivirus Apps Have Critical Security Vulnerabilities

Numerous Android Antivirus Apps Have Critical Security Vulnerabilities

by ethhack

An antivirus app should ideally keep the phone safe from security threats. However, researchers have found numerous Android antivirus apps exhibiting security vulnerabilities. One of these apps even exposes the users’ address book.

Flaws Discovered In Android Antivirus Apps

Researchers from Comparitech have identified numerous antivirus mobile apps having serious security issues. They tested 21 different applications, of which, around 47% failed their tests.

As stated in their blog,

We found serious security flaws in three of the apps we tested, and found seven apps that couldn’t detect a test virus.

In summary, they found three apps containing security vulnerabilities. Of these, the app named ‘VIPRE’ had a critical IDOR (insecure direct object reference) flaw that exposed contacts from the users’ address book.

Using the online dashboard… it was possible for attackers to access the address books of VIPRE Mobile users with cloud sync enabled.

Upon exploit, the flaw allowed downloading users’ contacts as VCARDS having sensitive information. According to researchers,

Many of the leaked contacts contain full names, photos, addresses, and notes with sensitive personal information.

VIPRE also had another flaw that could allow an attacker to send fake antivirus alerts.

The other two apps contained vulnerabilities include BullGuard and AEGISLAB. In the case of BullGuard, the app had two flaws – an XSS flaw, and the other allowing an attacker to remotely disable the app. Whereas, in the case of AEGISLAB, the app’s we dashboard was vulnerable to XSS attacks.

Researchers have shared the details of these vulnerabilities, along with the relevant PoC’s in their blog.

In addition, the researchers also identified seven different apps that failed to detect a test virus. Moreover, they also noticed how an app ‘dfndr security’ asked dangerous permissions.

dfndr puts users search and browser habits up for sale on every ad exchange there is.
dfndr also requests permission to access fine location data, access the camera, read and write contacts, look through the address book, and grab the IMEI (unique ID) and phone number of the device.

What Now?

Comparitech confirmed that all three apps, VIPRE, BullGuard, and AEGISLAB have fixed the vulnerabilities.  However Privacy Lab Antivirus & Mobile Security, are no more on the Play Store, since they failed to detect the test virus file.

For now, the only viable workaround to protect oneself from such issues is to make sure to download apps from reputable developers only. This applies to antivirus apps as well.

Let us know your thoughts in the comments.

The following two tabs change content below.
Avatar
Abeerah has been a passionate blogger for several years with a particular interest towards science and technology. She is crazy to know everything about the latest tech developments. Knowing and writing about cybersecurity, hacking, and spying has always enchanted her. When she is not writing, what else can be a better pastime than web surfing and staying updated about the tech world! Reach out to me at: [email protected]
Avatar

Source link

Related Articles

Leave a Comment