** DISPUTED ** An issue was discovered in the GAEN (aka Google/Apple Exposure Notifications) protocol through 2020-10-05, as used in COVID-19 applications on Android and iOS. The encrypted metadata block with a TX value lacks a checksum, allowing bitflipping to amplify a contamination attack. This can cause metadata deanonymization and risk-score inflation. NOTE: the vendor's position is "We do not believe that TX power authentication would be a useful defense against relay attacks."
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2020/Oct/12 | Exploit Mailing List Third Party Advisory |
https://github.com/google/exposure-notifications-internals/blob/main/en-risks-and-mitigations-faq.md#additional-considerations | Third Party Advisory |
https://blog.google/inside-google/company-announcements/update-exposure-notifications | Third Party Advisory |
http://packetstormsecurity.com/files/159496/GAEN-Protocol-Metadata-Deanonymization-Risk-Score-Inflation.html | Exploit Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
Information
Published : 2020-10-07 08:15
Updated : 2020-10-22 19:26
NVD link : CVE-2020-24722
Mitre link : CVE-2020-24722
JSON object : View
CWE
CWE-294
Authentication Bypass by Capture-replay
Products Affected
exposure_notifications_project
- exposure_notifications