exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Sophos Secure Email Android Application 3.9.4 Man-In-The-Middle

Sophos Secure Email Android Application 3.9.4 Man-In-The-Middle
Posted Jul 6, 2020
Authored by David Coomber

Sophos Secure Email Android Application versions 3.9.4 and below suffer from a man-in-the-middle vulnerability due to a lack of validation of SSL certificates.

tags | advisory
advisories | CVE-2020-14980
SHA-256 | 564bf74464507abc31328cd13ce11650838cbcc6c851afff00c70b4726aa428c

Sophos Secure Email Android Application 3.9.4 Man-In-The-Middle

Change Mirror Download
Sophos Secure Email Android Application - MITM SSL Certificate Vulnerability (CVE-2020-14980)
--
https://www.info-sec.ca/advisories/Sophos-Secure-Email.html

Overview
"Sophos Secure Email is a containerized and secure email app that lets you fully separate enterprise and private data on your device. It handles the corporate emails, contacts and calendar from the company’s Exchange server. Corporate data is protected with AES-256 encryption and the export of data is controlled by the company’s Data Loss Prevention (DLP) rules."

(https://play.google.com/store/apps/details?id=com.sophos.sse)

Issue
The Sophos Secure Email Android application (version 3.9.4 and below, later versions have not been tested), does not validate the SSL certificate it receives when connecting to the application server.

Impact
An attacker who can perform a man in the middle attack may present a bogus SSL certificate which the application will accept silently. Sensitive information could be captured by an attacker without the user's knowledge.

Timeline
October 31, 2016 - Notified Sophos via security-alert@sophos.com
October 31, 2016 - Sophos confirmed receipt of the report
November 7, 2016 - Asked for a status update
November 8, 2016 - Sophos confirmed the issue
November 8, 2016 - Provided additional information about the issue
November 9, 2016 - Sophos provided information on the timing of the fix
November 10, 2016 - Sophos advised that they are not planning on addressing the issue
June 22, 2020 - Published an advisory to document the issue

CVE-ID:
CVE-2020-14980

Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    50 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close