Learn about CVE-2020-15502 affecting DuckDuckGo app on Android and iOS. Discover how visit data may be exposed through .ico requests, posing privacy risks.
DuckDuckGo application for Android and iOS may expose visit data to a Potentially Unwanted Endpoint through .ico requests.
Understanding CVE-2020-15502
The vulnerability in DuckDuckGo's mobile applications could lead to privacy concerns due to data exposure.
What is CVE-2020-15502?
The DuckDuckGo app on Android (up to version 5.58.0) and iOS (up to version 7.47.1.0) sends website hostnames via .ico requests to duckduckgo.com servers, potentially compromising user visit data.
The Impact of CVE-2020-15502
The vulnerability may allow temporary exposure of user visit data to an unintended endpoint, raising privacy risks.
Technical Details of CVE-2020-15502
Details about the vulnerability and its implications.
Vulnerability Description
The DuckDuckGo app sends hostnames of visited websites through .ico requests to servers in the duckduckgo.com domain, potentially exposing user visit data.
Affected Systems and Versions
Exploitation Mechanism
By sending HTTPS .ico requests to DuckDuckGo servers, user visit data can be accessed temporarily, posing a privacy risk.
Mitigation and Prevention
Ways to address and prevent the vulnerability.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates