Skip to main content

Beware of ‘Cupid,’ the new Heartbleed attack method that affects Android devices

cupid the new heartbleed attack method that affects android devices bug
Photo via Luis Grangeia's Slideshare page Image used with permission by copyright holder

If you think the Heartbleed Bug threat is over, think again. Less than two months since the security flaw was first exposed, exploiting it just got a lot easier.

According to Portuguese security researcher Luis Grangeia, the new attack method, which has been named Cupid, exploits a vulnerability in OpenSSL the same way as Heartbleed. The only difference is, it would perform its function over Wi-Fi instead of the Internet and targets Android devices.

Recommended Videos

(For more info, read our list of Android devices openly vulnerable to Heartbleed.)

“This is basically the same attack as Heartbleed, based on a malicious heartbeat packet. Like the original attack, which happens on regular TLS connections over TCP, both clients and servers can be exploited and memory can be read off processes on both ends of the connections,” Grangeia said in a blog post.

“The difference in this scenario is that the TLS [Transport Layer Security] connection is being made over EAP [Extensible Authentication Protocol], which is an authentication framework/ mechanism used in Wireless networks. It’s also used in other situations, including wired networks that use 802.1x Network Authentication and peer to peer connections … To exploit vulnerable clients, hostapd (with the cupid path) can be used to setup an “evil” network such that, when the vulnerable client tries to connect and requests a TLS connection, hosted will send malicious heartbeat requests, triggering the vulnerability.”

There are two programs affected by Cupid:

  • Hostapd is used for setting up a configurable access point on Linux.
  • Grangeia said that it is possible to create almost any kind of wireless network configuration and let clients connect to it. The other program, wpa_supplicant, is used for connecting to wireless networks on Linux and Android.

There are two attack scenarios for Cupid. The first one involves an “evil client” that uses an altered wpa_supplicant application for authenticating Wi-Fi communications. An attacker can request a connection to vulnerable server. Once a connection is made, hackers can send heartbeat requests. The second attack scenario involves using an altered hostapd application to access a vulnerable client. This allows attackers to set up a network for sending malicious heartbeat requests.

 According to Grangeia, devices running on Android 4.1.0 and and 4.1.1 are vulnerable. However, the risk is not limited to older software. Grangeia said that since all versions of Android use wpa_supplicant to connect to wireless networks, it is possible that all devices running on the OS may be vulnerable.

Aside from mobile devices, Linux systems and corporate wireless connections are also vulnerable. Home routers, on the other hand, are deemed safe because they do not use EAP.

Grangeia’s findings have inspired dissent from other developers, primarily from FreeRadius, which claims to be the “world’s most popular Radius server.” In response to comments that the Cupid vulnerability has been known early on, he said: “The attack method, however, is new. Up until now there were no publicly available tools that would trigger the Heartbleed vulnerability via EAP.”

Pierluigi Paganini, who works for the European Union Agency for Network and Information Security, explained that an attacker would not need a valid password to exploit the flaw. A username is enough to exploit the vulnerability. A full TLS connection (which allows clients and servers to communicate across a network securely) is also not required since heartbeat requests can be sent and received before keys and certificates are exchanged.

If you have a vulnerable device, we advise that you take steps to protect your information. Grangeia has created patches for vulnerable hostapd and wpa_supplicant applications, which can be found on his Github page.

Christian Brazil Bautista
Christian Brazil Bautista is an experienced journalist who has been writing about technology and music for the past decade…
How to use Private Space, Android 15’s best new feature
Private Space option in app library of Android 15.

Android 15 is not too far off from its public release, and it has already hit the second stability milestone following extended developer-specific and open beta testing phases. Interestingly, one of the standout themes this time around has been the focus on security. Take, for example, additions like partial screen recording and screen capture detection.

Read more
An absurd new phone is coming to crush the iPhone and Android
A render of the Up Mobile smartphone.

Just when you thought Web3 -- the name given to a decentralized version of the internet -- had been consigned to the history books, along comes a new smartphone project to try to convince you otherwise, and, in an attempt to ensure it appears as up-to-date as possible, adds another buzzword to the list: AI.

What I’m talking about is called the Up Mobile, and if mention of Web3 and AI together weren't enough, it also has some blockchain technology inside for good measure. If this were Buzzword Bingo, someone would be shouting "House!" right about now.

Read more
This new Android tablet is everything I wish the 2024 iPad Air was
Vivo Pad 3

China-based Vivo has introduced a new tablet, the Vivo Pad 3, and based on the specs alone, this could fast become one of the best Android tablets of the year. Perhaps more importantly, it could become an exciting competitor to the recently released iPad Air (2024).

The Vivo Pad 3 boasts a 12.1-inch LCD, a 2,800 x 1,968 resolution, and a 7:5 screen ratio. The display, with a P3 gamut, also offers 600 nits peak brightness and HDR10 support. As if that weren't enough, you also get a 144Hz refresh rate.

Read more