• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Amazon Fixes High Severity Vulnerability in Amazon Photos Android App

You are here: Home / General Cyber Security News / Amazon Fixes High Severity Vulnerability in Amazon Photos Android App
June 29, 2022

Cybersecurity researchers from Checkmarx have spotted a critical vulnerability affecting the Amazon Photos app on Android.

If exploited, the flaw could enable a malicious application installed on the user’s phone to steal their Amazon entry token.

From a specialized standpoint, the Amazon accessibility token is applied to authenticate people across a variety of Amazon application plan interfaces (API), some of which incorporate individually identifiable data (PII) that could be uncovered during attacks.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Other APIs, like the Amazon Push API, could make it possible for risk actors (TA) to get whole accessibility to the user’s documents. 

According to Checkmarx, the vulnerability derived from a misconfiguration of a person of the Photos app’s parts, which would allow for external applications to entry it. 

Anytime this exercise was introduced, it induced an HTTP ask for that carried a header with the customer’s entry token. The server getting the ask for could then be controlled.

“Knowing this, a destructive application set up on the victim’s phone could send out an intent that correctly launches the susceptible exercise and triggers the request to be despatched to a server controlled by the attacker,” wrote the researchers.

“With all these alternatives available for an attacker, a ransomware situation was uncomplicated to appear up with as a possible attack vector. A destructive actor would only need to have to examine, encrypt, and re-produce the customer’s files although erasing their history.”

What’s more, Checkmarx explained that it only analyzed a number of APIs in its investigate, constituting a tiny subset of the full Amazon ecosystem.

“It’s possible that other Amazon APIs would also be obtainable to an attacker with that same token,” the security gurus defined.

Upon getting this set of vulnerabilities, Checkmarx claimed its first action was to call the Amazon Pics improvement staff. 

“Due to the high likely effects of the vulnerability and the high chance of success in actual attack eventualities, Amazon thought of this a high severity issue and released a deal with for it quickly soon after it was claimed.”

The news arrives a month following a misconfigured databases exposed a major coordinated scheme by Amazon distributors to get hold of phony critiques for their products and solutions.


Some pieces of this short article are sourced from:
www.infosecurity-magazine.com

Previous Post: «security innovation: secure systems start with foundational hardware Security Innovation: Secure Systems Start with Foundational Hardware
Next Post: Cybersecurity Researchers Launch New Malware Hunting Tool YARAify Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New Variant of Banking Trojan BBTok Targets Over 40 Latin American Banks
  • How to Interpret the 2023 MITRE ATT&CK Evaluation Results
  • Iranian Nation-State Actor OilRig Targets Israeli Organizations
  • High-Severity Flaws Uncovered in Atlassian Products and ISC BIND Server
  • Apple Rushes to Patch 3 New Zero-Day Flaws: iOS, macOS, Safari, and More Vulnerable
  • Mysterious ‘Sandman’ Threat Actor Targets Telecom Providers Across Three Continents
  • Researchers Raise Red Flag on P2PInfect Malware with 600x Activity Surge
  • The Rise of the Malicious App
  • China Accuses U.S. of Decade-Long Cyber Espionage Campaign Against Huawei Servers
  • Cyber Group ‘Gold Melody’ Selling Compromised Access to Ransomware Attackers

Copyright © TheCyberSecurity.News, All Rights Reserved.