Technology
Mobile
Internet & Software
Events
More
Apps Google Internet & Software Tech News

Major Security vulnerability found in Android VPN affecting Kit Kat and Jelly Bean

Major security vulnerability has been found in Android’s VPN implementation affecting Android 4.3 Jelly Bean and the latest Android 4.4 Kit Kat (Which affects approximately 62.5% of all Android devices). The issue found will allow hackers to bypass the active VPN configuration and redirect the traffic to third party servers which can then capture the traffic and with this, sensitive information like emails, passwords, usernames or anything that is being send through the network can be seen, the Computer Emergency Response Team of India (CERT-In) reports.

A VPN is used to create a private connection between computers over a public network, this is mainly used by Organisations that want to create a secure connection from the different devices such as smartphones, tablets, laptops and desktop computers to enterprise networks.

Usually the data send through a VPN is encrypted but the agency made the following statement:

 Still there is a possibility that attacker could possibly capture sensitive information from the affected device in plain text (non-encrypted data) like email addresses, IMEI number, SMSes, installed applications

This is of course taking for granted that all the websites and any Android applications you use have a secure connection, if only one of them fails it could lead to a major leak of personal information. Apps which directly connecting to the server using SSL will not be affected neither will websites using HTTPS.


Tariq Wahid

About the author Tariq Wahid

As it states, I am Tariq Wahid. I'm currently aspiring to become an Aerospace Engineer and working on a Dual Award Engineering course. I am the proud owner of a Motorola G with Android 4.4.3, and I am looking to buy a MOTO 360 and X+1. As you can tell I am with Android in the Mobile OS "War". I work Read More

Tags:

Leave a Reply

Your email address will not be published. Required fields are marked *