GAEN (aka Google/Apple Exposure Notifications) through 2021-04-27 on Android allows attackers to obtain sensitive information, such as a user's location history, in-person social graph, and (sometimes) COVID-19 infection status, because Rolling Proximity Identifiers and MAC addresses are written to the Android system log, and many Android devices have applications (preinstalled by the hardware manufacturer or network operator) that read system log data and send it to third parties. NOTE: a news outlet (The Markup) states that they received a vendor response indicating that fix deployment "began several weeks ago and will be complete in the coming days."
References
Link | Resource |
---|---|
https://themarkup.org/privacy/2021/04/27/google-promised-its-contact-tracing-app-was-completely-private-but-it-wasnt | Exploit Press/Media Coverage Third Party Advisory |
https://blog.appcensus.io/2021/04/27/why-google-should-stop-logging-contact-tracing-data/ | Exploit Third Party Advisory |
Configurations
Information
Published : 2021-04-27 19:15
Updated : 2021-05-07 11:28
NVD link : CVE-2021-31815
Mitre link : CVE-2021-31815
JSON object : View
CWE
CWE-319
Cleartext Transmission of Sensitive Information
Products Affected
- google\/apple_exposure_notifications