exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Neon 1.6.14 Missing SSL Certificate Validation

Neon 1.6.14 Missing SSL Certificate Validation
Posted Jan 16, 2018
Authored by Rodrigo Laneth

Neon version 1.6.14 for iOS fails to validate SSL certificates.

tags | advisory
systems | ios
advisories | CVE-2018-5258
SHA-256 | 0455162fadf4be53b7ece4643e0c17f957bb14c64a2dbe1ef81617f8316086c0

Neon 1.6.14 Missing SSL Certificate Validation

Change Mirror Download
Title 

========

Neon 1.6.14 for iOS Missing SSL Certificate Validation



Date

========

2018-01-15



Author

========

Rodrigo Laneth

Twitter: @rlaneth



CVE-ID

========

CVE-2018-5258



Vendor

========

Banco Neon S.A.



Software

========

Neon

https://itunes.apple.com/app/neon/id1127996388



Version

========

1.6.14

Previous versions have not been tested, but may also be affected.



Platform

========

iOS



Summary

========

The Neon app 1.6.14 for iOS does not verify X.509 certificates from SSL servers,

which allows man-in-the-middle attackers to spoof servers and obtain sensitive

information via a crafted certificate.



Details

========

The app does not validate SSL certificates from the

webapimethods.banconeon.com.br and servicos.banconeon.com.br hosts, allowing a

man-in-the-middle attacker to silently intercept requests.



In addition to SSL, the app implements a custom layer of encryption. It does

not, however, serve as an effective protection against attacks. One of its

weaknesses is that it encrypts sensitive data with AES using a key received from

the server when the user logs in; although this key is RSA encrypted when

transmitted, the private keys necessary for its decryption are hardcoded within

the app, and therefore could be easily obtained by an attacker.



Sensitive user information such as name, virtual card number, expiration date

and verification code (CVV) have been confirmed to be recoverable through the

exploitation of this vulnerability and the weaknesses present in the app's

custom encryption layer.



Response

========

Up to date, Banco Neon S.A. has not yet addressed this vulnerability.



Timeline

========

- [2017-12-30] First attempt to contact the vendor (no response).


- [2018-01-06] Second attempt to contact the vendor. The vendor affirms the

report will be forwarded to the app's development team, but does not provide a

deadline for the release of an update addressing the issue.



- [2018-01-13] Vendor is informed of the assignment of a CVE ID and the planned

date for disclosure. The vendor affirms the issue is being investigated by the

app's development team, not providing any new information.



- [2018-01-15] Full disclosure.
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close