Affiliate Disclosure
If you buy through our links, we may get a commission. Read our ethics policy.

Some 1,500 iOS apps exposed to serious HTTPS vulnerability, analytics firm says

Approximately 1,500 iOS apps are exposed to a vulnerability that could let a hacker bypass HTTPS security and steal passwords and other sensitive data, according to research released on Monday.

Analytics firm SourceDNA said the problem traces back to AFNetworking, an open-source code library many apps use for networking functions. Version 2.5.1, released in January, accidentally introduced a bug which could let someone on the same Wi-Fi network — or otherwise able to monitor a connection — present a fake SSL certificate and successfully decrypt HTTPS data.

The glitch causes AFNetworking to simply skip a validation check. The issue was first noted by ArsTechnica.

The problem was solved with a v2.5.2 update three weeks ago, but many iOS apps are still using the old code, including some prominent titles like Alibaba, Uber, Movies by Flixster, and Citrix OpenVoice Audio Conferencing.

The number of exposed apps could exceed 1,500. SourceDNA said it analyzed 1 million of the 1.4 million titles in the App Store, including all free titles, but only the top 5,000 paid ones. Affected apps were not only using an outdated version of AFNetworking but failing to use certificate pinning, which allows only a specific certificate for HTTPS. Pinning is off by default in AFNetworking.

Before coming to a final tally SourceDNA contacted developers privately, allowing some of them to fix the issue. Major companies like Uber, Yahoo, and Microsoft are said to have made app changes, although some of their apps are still exposed. A web-based search tool can be used to learn if an app is vulnerable or has already been patched.

Late last week, security researcher Patrick Wardle wrote that OS X 10.10.3 has failed to completely fix RootPipe, a flaw that could allow Mac software to gain root access without authenticating. Wardle said that he is deliberately withholding details from the public for safety's sake, but has already notified Apple.



29 Comments

dipdog3 11 Years · 89 comments

Glad it is only iOS apps, all of us Android users are safe!

thewhitefalcon 10 Years · 4444 comments

[quote name="DipDog3" url="/t/185886/some-1-500-ios-apps-exposed-to-serious-https-vulnerability-analytics-firm-says#post_2713055"]Glad it is only iOS apps, all of us Android users are safe![/quote] That's like saying the missing plank in your neighbors fence makes him unsafe, when you don't have [I]any[/I] fence, nor door or window locks in your house.

leavingthebigg 11 Years · 1291 comments

Suggestion to iOS developers, do the extra work to get things done instead of using third party tools. When I was developing an app that used HTTPS, I looked at AFNetworking then decided not to tie the success or failure of my app to a third party.

freerange 16 Years · 1597 comments

"Wardle said that he is deliberately withholding details from the public for safety's sake, but has already notified Apple." A big thank you goes out to Wardle!

MacPro 18 Years · 19845 comments

[quote name="TheWhiteFalcon" url="/t/185886/some-1-500-ios-apps-exposed-to-serious-https-vulnerability-analytics-firm-says#post_2713059"] That's like saying the missing plank in your neighbors fence makes him unsafe, when you don't have [I]any[/I] fence, nor door or window locks in your house.[/quote] Great analogy! :D