TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Rave Panic Button: Vulnerabilities in a Nationwide Emergency Alert System

85 pointsby rwestergrenover 8 years ago

12 comments

zarothover 8 years ago
So they found a hard-coded API token and no further user authentication to limit the requests. This is obviously a common rookie mistake (didn&#x27;t Facebook, Snapchat, Instagram all fall for this at some point?) and security software particularly should not have such a basic vulnerability, but I do think TFA veers past security writeup into editorial when they start critiquing the cost&#x2F;pricing and calling for customers to drop the software, particularly since the vendor was responsive to the report.<p>It seems like maybe the vendor&#x27;s communication trailed off toward the end leaving OP with bad feelings which show up in the write-up.<p>Generally I like to see security research and vulnerabilities reported as a way to document the process used and experience gained, but not to skewer the company except with respect to their responsiveness of a patch.<p>Of course, everyone here is free to skewer the app as much as they like, I just don&#x27;t like reading it in the actual write-up.
评论 #13387518 未加载
rixraxover 8 years ago
Montana TV station EAS system hacked a few years a go [1]. While I applaud for the humor, I am still in awe of how little attention this Orson Welles(ish) episode got.<p>[1]: <a href="https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=TQWtqJylMKQ" rel="nofollow">https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=TQWtqJylMKQ</a>
sailfastover 8 years ago
This discovery and write-up was an awesome read but I do disagree on the price critique. 70K seems relatively inexpensive for deployment of an app at a state level, let alone development of an app. Proof of Concept, perhaps but what does a full security audit cost these days? If anything I would be concerned that the budget did not include those kinds of factors and should have cost a bit more :)<p>This article does lead me to wonder if Rave has missed an opportunity - installation of an app on Crestron &#x2F; Andoird room automation systems that accomplish similar things. That would take the mobile component out but still have a benefit from a facilities &#x2F; awareness perspective.
评论 #13385063 未加载
stuaxoover 8 years ago
The author says that $70k seems a lot to build the app.<p>I don&#x27;t know how long it took, but depending on the size of the team etc, it sounds pretty cheap TBH - certainly not enough $ there to make something secure and supported.
评论 #13384676 未加载
评论 #13384606 未加载
评论 #13384950 未加载
raesene9over 8 years ago
Interesting technical detail but for me the main takeaway from that was that we&#x27;re still seeing expensive software systems ($70k per customer) being procured by large numbers of organizations (~2000 customers) to do safety critical work, and still none of them are mandating security reviews as part of the procurement process (or indeed requiring the vendor to have had a review done).<p>The vulns found here are serious, but any moderately detailed app security review should&#x2F;would have found them.<p>Until customers start requiring security reviews for the software their buying we&#x27;ll see a load more insecure apps being sold.
评论 #13387582 未加载
ParadoxOryxover 8 years ago
That&#x27;s definitely concerning. Makes you wonder how well secured our other emergency&#x2F;critical systems really are.
patcheudorover 8 years ago
Hey, good find but I&#x27;m a little confused. It appears that you found what could be a serious issue if no other checks are in place; however, in doing so you appear to have exceeded the access you were provided through the application to their back-end system. Did this fall under a bug bounty program where you had permission to do this or did the company give you written permission? I was looking for a bug bounty program and couldn&#x27;t find one.<p>I ask because it looks like you were performing testing which touched their infrastructure, not just your phone and the US Computer Fraud and Abuse act gets pretty scary (Felony scary) when it comes to such things:<p><a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Computer_Fraud_and_Abuse_Act" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Computer_Fraud_and_Abuse_Act</a><p>I do a ton of mobile application reviews and find stuff like this quite often but back away at the point I start touching their infrastructure rather than just my phone.
charonn0over 8 years ago
&gt; In order to confirm this suspicion, I decided to proxy my phone’s traffic and attempt registering with the app using dummy phone values.<p>Am I wrong in assuming that being able to proxy the app&#x27;s HTTPS traffic is evidence of another security problem, specifically that the app is not validating the server&#x27;s SSL certificate?
评论 #13384944 未加载
wildrhythmsover 8 years ago
Great snooping, and an awesome writeup! As the author points out, organizations should be wary of security even when the developer&#x2F;publisher claims that it&#x27;s secure.
elipseyover 8 years ago
The vendor was notified three weeks before this public disclosure. Is this reasonable? How should a timeline for public disclosure be determined?
评论 #13386630 未加载
评论 #13384869 未加载
thescriptkiddieover 8 years ago
Anyone have a mirror for the redacted source code?
评论 #13387385 未加载
rhodridover 8 years ago
Rave Panic Button: For when the drop goes too deep.