An issue was discovered in the GAEN (aka Google/Apple Exposure Notifications) protocol through 2020-10-05, as used in COVID-19 applications on Android and iOS. The encrypted metadata block with a TX value lacks a checksum, allowing bitflipping to amplify a contamination attack. This can cause metadata deanonymization and risk-score inflation. NOTE: the vendor's position is "We do not believe that TX power authentication would be a useful defense against relay attacks.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/159496/GAEN-Protocol-Metadata-Deanonymization-Risk-Score-Inflation.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2020/Oct/12 | Exploit Mailing List Third Party Advisory |
https://blog.google/inside-google/company-announcements/update-exposure-notifications | Third Party Advisory |
https://github.com/google/exposure-notifications-internals/blob/main/en-risks-and-mitigations-faq.md#additional-considerations | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
07 Nov 2023, 03:20
Type | Values Removed | Values Added |
---|---|---|
Summary | An issue was discovered in the GAEN (aka Google/Apple Exposure Notifications) protocol through 2020-10-05, as used in COVID-19 applications on Android and iOS. The encrypted metadata block with a TX value lacks a checksum, allowing bitflipping to amplify a contamination attack. This can cause metadata deanonymization and risk-score inflation. NOTE: the vendor's position is "We do not believe that TX power authentication would be a useful defense against relay attacks. |
Information
Published : 2020-10-07 15:15
Updated : 2024-08-04 16:15
NVD link : CVE-2020-24722
Mitre link : CVE-2020-24722
CVE.ORG link : CVE-2020-24722
JSON object : View
Products Affected
exposure_notifications_project
- exposure_notifications
CWE
CWE-294
Authentication Bypass by Capture-replay