lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Date: Fri, 22 Apr 2016 12:32:57 +0200
From: SEC Consult Vulnerability Lab <>
To: <>, <>
Subject: SEC Consult SA-20160422-0 :: Insecure credential storage in my devolo
 Android app

SEC Consult Vulnerability Lab Security Advisory < 20160422-0 >
              title: Insecure data storage
            product: my devolo - android application -
 vulnerable version: 1.2.8
      fixed version:
         CVE number:
             impact: High
              found: 2015-10-30
                 by: A. Nochvay (Office Moscow)
                     SEC Consult Vulnerability Lab

                     An integrated part of SEC Consult
                     Berlin - Frankfurt/Main - Montreal - Moscow
                     Singapore - Vienna (HQ) - Vilnius - Zurich



Vendor description:
devolo AG has been developing innovative Powerline and data communications
products for private customers and professional users.devolo Home Control
expands on the idea of the easy way to connect and is emerging as a new
product world for the smart home that simply enables greater comfort and
convenience, security and energy savings.


Business recommendation:
Attackers might be able to recover sensitive information from stolen/lost devices.
With this information attackers can control user's smart devices, change
temperature and watching user's remote camera.

SEC Consult recommends not to store sensitive information on mobile devices.

Vulnerability overview/description:
The application "my devolo" uses the SharedPreferences android mechanism for
storing information about the user including login credentials for the site In the event that an adversary physically attains the mobile
device, the adversary might be able to hook up the mobile device to a computer
with freely available software. These tools allow the adversary to see all third
party application directories.

Proof of concept:
Has been removed due to the request from the vendor.

Vulnerable / tested versions:
The vulnerability has been discovered in "my devolo" version 1.2.8, which
is the latest version in Google Play Store at this time.

Vendor contact timeline:
2015-11-10: Transmission of advisory via a data-exchange platform provided by
the vendor
2016-02-23: Confirmation of the described issue via email by vendor
2016-04-22: Public advisory release

no solution available

no workaround available

Advisory URL:


SEC Consult Vulnerability Lab

SEC Consult
Berlin - Frankfurt/Main - Montreal - Moscow
Singapore - Vienna (HQ) - Vilnius - Zurich

About SEC Consult Vulnerability Lab
The SEC Consult Vulnerability Lab is an integrated part of SEC Consult. It
ensures the continued knowledge gain of SEC Consult in the field of network
and application security to stay ahead of the attacker. The SEC Consult
Vulnerability Lab supports high-quality penetration testing and the evaluation
of new offensive and defensive technologies for our customers. Hence our
customers obtain the most current information about vulnerabilities and valid
recommendation about the risk profile of new technologies.

Interested to work with the experts of SEC Consult?
Send us your application

Interested in improving your cyber security with the experts of SEC Consult?
Contact our local offices

Mail: research at sec-consult dot com

EOF Aleksandr Nochvay / @2015

Download attachment "signature.asc" of type "application/pgp-signature" (820 bytes)

Powered by blists - more mailing lists