Learn about CVE-2020-26230, a vulnerability in Radar COVID allowing the identification of COVID-19 positive users. Find out the impacted systems, exploitation risks, and mitigation steps.
Radar COVID is the official COVID-19 exposure notification app for Spain. In affected versions of Radar COVID, identification and de-anonymization of COVID-19 positive users that upload Radar COVID TEKs to the Radar COVID server is possible. This vulnerability enables the identification and de-anonymization of COVID-19 positive users when using Radar COVID. The issue was fixed in iOS version 1.0.8, Android version 1.0.7, and Backend version 1.1.2-RELEASE.
Understanding CVE-2020-26230
This CVE highlights a vulnerability in Radar COVID that allows the identification and de-anonymization of COVID-19 positive users.
What is CVE-2020-26230?
The vulnerability in Radar COVID allows on-path observers to monitor traffic between the app and the server, potentially identifying users who had a positive COVID-19 test. This could lead to de-anonymization of users.
The Impact of CVE-2020-26230
Technical Details of CVE-2020-26230
This section provides more technical insights into the vulnerability.
Vulnerability Description
The vulnerability allows for the identification and de-anonymization of COVID-19 positive users by monitoring traffic between the app and the server.
Affected Systems and Versions
Exploitation Mechanism
The issue arises from the fact that only COVID-19 positive users make connections to the server, allowing observers to identify them.
Mitigation and Prevention
It is crucial to take immediate steps to address this vulnerability.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Ensure all devices running Radar COVID are updated to the patched versions to prevent exploitation of this vulnerability.