Skip to content
Naked Security Naked Security

No Android passcode? No problem! Skype unlocked it for you

Microsoft closed the hole, which let any unauthenticated phone-grabber answer a Skype call and then roam around on your mobile.

Need to spy on your spouse? Your employees? That suspect who refuses to unlock his Android? It was easy-peasy up until a few weeks ago: you could have just grabbed their phone, placed a Skype call to it, answered the call, then poked around, no passcode needed.

In October, Florian Kunushevci, a 19-year-old bug hunter from Kosovo, reported the Skype for Android security flaw to Microsoft. It patched the hole for the latest version of Skype, which was issued 23 December.

He said in a post on LinkedIn that after he Skyped a target phone, the vulnerability let him view the photos,  albums, names and phone numbers in a victim’s contact list, as well as allowing him to access the phone’s browser. He also discovered that he could send messages from the phone, all without unlocking it.

Here’s Kunushevci’s proof of concept video:

None of that should happen. A user/attacker/thief/snoop shouldn’t have access to data such as photos and contacts without having gone through authentication via password, PIN, lock-screen pattern, or fingerprint.

Kunushevci told The Register that he wasn’t hunting for Skype for Android bugs. He was just using the Voice-over-IP (VoIP) app when he noticed something odd about how it accessed files on his handset. That’s when he started investigating to see how it might be exploited:

One day I got a feeling while using the app that there should be a need to check a part which seems to give me other options than it should. Then I had to change the way of thinking as a regular user into something that I can use for exploitation.

This is similar to an iOS 9 flaw from a few years ago that let you do the same thing. In September 2015, Apple patched a lock screen hole that let anyone view and edit your contacts, send text messages, and rummage through your photos, all without entering a passcode.

If you had an iOS 9 or 9.0.1 device with Siri accessible from your lock screen, you were vulnerable regardless of the type or length or your passcode, and regardless of whether you had turned on TouchID.

Hey, stuff happens when you code, Kunushevci said:

For the specific bug that I have found on Skype, it is more of a bad design and also a bug in coding. I think to put it all together, humans make mistakes.

Kunushevci said the Skype for Android vulnerability probably affects all Android devices using an unpatched Skype version. To protect themselves from the bug, users should update their Skype for Android app if they haven’t already.

The researcher wasn’t awarded a bug bounty, he said, but he should be getting a mention in Microsoft’s bug-hunter hall of fame, whenever that’s updated.


Psst… Did you know Sophos has a free Android security product? You can find out more about Sophos Mobile Security for Android here.

3 Comments

> “The researcher wasn’t awarded a bug bounty, he said,” I think he should have been offered a bug bounty, if only for the bounty program to retain credibility. Yes, this is a easy-to-exploit vulnerability, and yes, your grandmother could have discovered and executed it–even told her friends. And that just makes it all the more dangerous.

Reply

MS security + Google security = 0 security (your mileage may vary).
Ahh, another thing to patent/copy write – Zero Security Inc. Fully partnered with MS, Google, Facebook, Marriott, AFF, Swift, BC/BS, Yahoo, Target, RSA, Sony, NSA, and many others.
British branch is Naught Security, Canadian branch Zed Security.
Globally known as ZS. At ZS, there is no Security issue to big or to small to be ignored!
Never patch again, save millions on budget, we promise you; nothing is better than ZS, and we mean it!
Okay okay, I’ll put the coffee down…

Reply

Leave a Reply

Your email address will not be published. Required fields are marked *

Subscribe to get the latest updates in your inbox.
Which categories are you interested in?
You’re now subscribed!