Discover the impact of CVE-2020-24722, a vulnerability in the GAEN protocol used in COVID-19 apps on Android and iOS. Learn about the risks and mitigation steps.
An issue was discovered in the GAEN (aka Google/Apple Exposure Notifications) protocol through 2020-10-05, as used in COVID-19 applications on Android and iOS. The vulnerability allows for metadata deanonymization and risk-score inflation.
Understanding CVE-2020-24722
This CVE highlights a security flaw in the GAEN protocol used in COVID-19 applications on Android and iOS.
What is CVE-2020-24722?
The vulnerability in the GAEN protocol allows for a contamination attack through bitflipping, potentially leading to metadata deanonymization and risk-score inflation.
The Impact of CVE-2020-24722
The lack of a checksum in the encrypted metadata block with a TX value can amplify a contamination attack, risking metadata deanonymization and risk-score inflation.
Technical Details of CVE-2020-24722
The technical aspects of the vulnerability are crucial to understanding its implications.
Vulnerability Description
The issue lies in the GAEN protocol, where the encrypted metadata block with a TX value lacks a checksum, enabling a contamination attack through bitflipping.
Affected Systems and Versions
Exploitation Mechanism
The vulnerability allows attackers to perform a contamination attack by manipulating the TX value in the metadata block.
Mitigation and Prevention
Addressing and preventing the exploitation of CVE-2020-24722 is essential for maintaining security.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates