Business

News

 
More...

Alerts

 
More...

Events

 
More...
 
     
 

Vulnerabilities on SHAREit Application

 

Systems Affected


SHAREit Android application versions below or equal to 4.0.38

Threat Level


High


Overview


Two high-severity vulnerabilities were found in the SHAREit android application which will allow attackers to bypass authentication mechanism and steal sensitive files from victim's devices.


Description


SHAREit application is used by over 1.5 billion users and it is a widely used application to share video, music, files and applications on digital devices. SHAREit application is available on Android, iOS, Windows and Mac platforms. Among above users more than 500 million users use SHAREit android application and it was identified that there is an authentication bypass vulnerability and arbitrary file download vulnerability.
SHAREit server uses multiple services via different ports on a device, but researchers have identified two designated services including Command Channel (runs on Port 55183) and Download Channel (runs on port 2999).
Command Channel is a regular TCP channel where application exchange messages with other SHAREit instances running on other devices. Download Channel is the SHAREit application's own HTTP server which mainly enables other devices to download shared files. When SHAREit application send a file to an another device, a regular file transfer session begins with a device identification. Later the sender sends a control message to the receiver indicating that there is a file to be share. Once the receiver verifies that there is no duplication, it goes to Download Channel and fetch the sent file using the information from the control message.
However, researchers discovered that when a user with no valid session tries to fetch a non-existing page the HTTP server accept the request. Researchers also identified that when a download request is initiated there is no mechanism to check the authenticity of the session. This enables malicious client with a valid session to download any resource by directly referencing its download request.


Impact


  ✦  Malicious user can get access to your shared files on the device.
  ✦  Malicious user can share suspicious files which may include virus and malware.
  ✦  Disruption to regular operations.


Solution/ Workarounds


  ✦  Update or install latest version of the SHAREit android application which is available on play store.
  ✦  Check the authenticity of the files when you receive files from suspicious individuals through SHAREit application.


References


https://thehackernews.com/2019/02/shareit-android-hacking.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+TheHackersNews+%28The+Hackers+News+-+Cyber+Security+Blog%29&_m=3n.009a.1937.pg0ao0dyh2.171v
https://www.cyberintelligence.in/vulnerabilities-in-shareit-application/


Disclaimer


The information provided herein is on "as is" basis, without warranty of any kind.


 
     

© Copyright Sri Lanka CERT|CC. All Rights Reserved.