Skip to main content

Beware of ‘Cupid,’ the new Heartbleed attack method that affects Android devices

cupid the new heartbleed attack method that affects android devices bug
Photo via Luis Grangeia's Slideshare page

If you think the Heartbleed Bug threat is over, think again. Less than two months since the security flaw was first exposed, exploiting it just got a lot easier.

According to Portuguese security researcher Luis Grangeia, the new attack method, which has been named Cupid, exploits a vulnerability in OpenSSL the same way as Heartbleed. The only difference is, it would perform its function over Wi-Fi instead of the Internet and targets Android devices.

(For more info, read our list of Android devices openly vulnerable to Heartbleed.)

“This is basically the same attack as Heartbleed, based on a malicious heartbeat packet. Like the original attack, which happens on regular TLS connections over TCP, both clients and servers can be exploited and memory can be read off processes on both ends of the connections,” Grangeia said in a blog post.

“The difference in this scenario is that the TLS [Transport Layer Security] connection is being made over EAP [Extensible Authentication Protocol], which is an authentication framework/ mechanism used in Wireless networks. It’s also used in other situations, including wired networks that use 802.1x Network Authentication and peer to peer connections … To exploit vulnerable clients, hostapd (with the cupid path) can be used to setup an “evil” network such that, when the vulnerable client tries to connect and requests a TLS connection, hosted will send malicious heartbeat requests, triggering the vulnerability.”

There are two programs affected by Cupid:

  • Hostapd is used for setting up a configurable access point on Linux.
  • Grangeia said that it is possible to create almost any kind of wireless network configuration and let clients connect to it. The other program, wpa_supplicant, is used for connecting to wireless networks on Linux and Android.

There are two attack scenarios for Cupid. The first one involves an “evil client” that uses an altered wpa_supplicant application for authenticating Wi-Fi communications. An attacker can request a connection to vulnerable server. Once a connection is made, hackers can send heartbeat requests. The second attack scenario involves using an altered hostapd application to access a vulnerable client. This allows attackers to set up a network for sending malicious heartbeat requests.

 According to Grangeia, devices running on Android 4.1.0 and and 4.1.1 are vulnerable. However, the risk is not limited to older software. Grangeia said that since all versions of Android use wpa_supplicant to connect to wireless networks, it is possible that all devices running on the OS may be vulnerable.

Aside from mobile devices, Linux systems and corporate wireless connections are also vulnerable. Home routers, on the other hand, are deemed safe because they do not use EAP.

Grangeia’s findings have inspired dissent from other developers, primarily from FreeRadius, which claims to be the “world’s most popular Radius server.” In response to comments that the Cupid vulnerability has been known early on, he said: “The attack method, however, is new. Up until now there were no publicly available tools that would trigger the Heartbleed vulnerability via EAP.”

Pierluigi Paganini, who works for the European Union Agency for Network and Information Security, explained that an attacker would not need a valid password to exploit the flaw. A username is enough to exploit the vulnerability. A full TLS connection (which allows clients and servers to communicate across a network securely) is also not required since heartbeat requests can be sent and received before keys and certificates are exchanged.

If you have a vulnerable device, we advise that you take steps to protect your information. Grangeia has created patches for vulnerable hostapd and wpa_supplicant applications, which can be found on his Github page.

Editors' Recommendations

Christian Brazil Bautista
Christian Brazil Bautista is an experienced journalist who has been writing about technology and music for the past decade…
These 80+ apps could be running adware on your iPhone or Android device
Illustration of an infected iPhone

Cybersecurity company Human has uncovered another adware campaign engaging in ad fraud that is targeting iOS and Android devices. In the simplest terms, ad fraud allows a bad actor to either visibly spam an app with ads, or to manipulate the code in such a way that the ads are invisible to the user while the bad actor extracts advertising money from a marketer.

In each iteration, it’s fraudulent. Ad fraud has been widespread in the industry for a while, and the latest investigation uncovered a cache of over 75 Android apps listed in the Google Play Store and nearly a dozen apps on Apple’s App Store that are engaged in various forms of ad fraud.

Read more
The best thing about Android 13 isn’t a new feature or setting — it’s something else
Android 13 logo on a Google Pixel 6a.

After months of testing, Google has finally unleashed Android 13, its current Android smartphone update for 2022. As far as updates go, it's not one that you'll notice. I've been using Android 13 for around two months prior to its release, and it's been a pretty whelming experience.

Unlike iOS 16, which is a large and hefty update, Android 13 is rather pedestrian. There's not much differentiating it visually or functionally from previous Android releases. Much of what sets Google apart from Apple on this front is that Apple frontloads all its significant app improvements into its big iOS releases. Google trickles its features out as soon as they're ready, so many features announced with Android 13 -- like a revamped Google Wallet and tablet-optimized apps -- have already landed. Because of that, Android 13 is an update that's barren of excitement.

Read more
Dynamic theming is coming to all Android 12 devices soon
Android 12's Material You design language with wallpaper-based theming.

Android 12 brings a major visual overhaul, but many of its visual improvements, including dynamic color theming, have been limited to Google's own Pixel lineup of smartphones. However, Google has now confirmed that Android 12's "Monet" theming engine for responsive color selection in the user interface will go live for all Android 12 devices very soon.

When Google first revealed the long list of features arriving with Android 12, Material You was one of the central elements aimed at appealing to users. The third iteration of Google's Material Design, Material You, is fashioned with the intent to allow users to customize their Android phones to match their personalities. As we noted above, the feature has been limited to Pixel smartphones. Google is now making it mandatory for manufacturers to include support for Material You on every device that runs — or is updated to — Android 12.

Read more