Amazon Kindle Archives – Gridinsoft Blog Welcome to the Gridinsoft Blog, where we share posts about security solutions to keep you, your family and business safe. Fri, 06 Aug 2021 16:45:13 +0000 en-US hourly 1 https://wordpress.org/?v=89706 200474804 Vulnerabilities in Amazon Kindle Allowed Taking Full Control of the Device https://gridinsoft.com/blogs/vulnerabilities-in-amazon-kindle/ https://gridinsoft.com/blogs/vulnerabilities-in-amazon-kindle/#respond Fri, 06 Aug 2021 16:45:13 +0000 https://blog.gridinsoft.com/?p=5790 Check Point researchers reported that in April of this year, IT giant Amazon eliminated critical vulnerabilities in the Amazon Kindle. The problems could be used to gain full control over the device, allowed them to steal the Amazon device token and other confidential data stored on it. For a successful attack on a Kindle, just… Continue reading Vulnerabilities in Amazon Kindle Allowed Taking Full Control of the Device

The post Vulnerabilities in Amazon Kindle Allowed Taking Full Control of the Device appeared first on Gridinsoft Blog.

]]>
Check Point researchers reported that in April of this year, IT giant Amazon eliminated critical vulnerabilities in the Amazon Kindle. The problems could be used to gain full control over the device, allowed them to steal the Amazon device token and other confidential data stored on it.

For a successful attack on a Kindle, just one book with malicious code is enough.

The potential attack began by sending a malicious e-book to the user’s mail. After receiving such an attachment, the victim only had to open it, and this launched the exploit. No additional user permission or action was required.

E-books could be used as Kindle malware with various consequences. For example, a hacker could delete all of the user’s e-books, as well as turn the Kindle into a bot and use it to attack other devices on the victim’s local network.experts write.

Even worse, the discovered vulnerabilities allowed attackers to target a specific category of users. For example, to hack a specific group of people or demographic group, a hacker simply had to inject malicious code into a popular e-book in the corresponding language or dialect. As a result, attacks became highly targeted.

The root of the problem lay in the structure of the parsing framework, namely the implementation associated with PDF documents. The attacks were possible thanks to a heap overflow associated with the PDF rendering feature (CVE-2021-30354), which allowed arbitrary write permissions on the device, and a local privilege escalation vulnerability in the Kindle App Manager service (CVE-2021-30355), which allowed combine two vulnerabilities into a chain to run malicious code with root privileges.

The researchers reported their findings to Amazon in February 2021, and already the April update of the Kindle firmware to version 5.13.5 contained a patch (the firmware is automatically installed on devices connected to the network).

We found vulnerabilities in the Kindle, and if hackers took advantage of them, they could take full control of the device. By sending an e-book with a malicious code to a Kindle user, a cybercriminal would be able to steal any information from the reader, from Amazon account details to payment information. Like other smart devices, the Kindle is often perceived as a harmless gadget that is not subject to security risks. However, our research shows that any device with network connectivity is, in fact, not much different from a computer. IoT devices are susceptible to the same types of attacks as smartphones. Any device connected to a PC, especially the popular Kindle, presents a cybersecurity risk, and users should be aware of this.said Yaniv Balmas, head of cybersecurity research at Check Point Software Technologies.

Let me remind you that Researcher Found Three Bugs Allowing Hacking Amazon Kindle also this February.

The post Vulnerabilities in Amazon Kindle Allowed Taking Full Control of the Device appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/vulnerabilities-in-amazon-kindle/feed/ 0 5790
Researcher Found Three Bugs Allowing Hacking Amazon Kindle https://gridinsoft.com/blogs/researcher-found-three-bugs-allowing-hacking-amazon-kindle/ https://gridinsoft.com/blogs/researcher-found-three-bugs-allowing-hacking-amazon-kindle/#respond Fri, 22 Jan 2021 18:15:57 +0000 https://blog.gridinsoft.com/?p=5022 Researcher Yogev Bar-On from Israeli consulting firm Realmode Labs talked about his KindleDrip attack technique and three Amazon Kindle bugs (already fixed) that underlie it. For discovery of these vulnerabilities the expert received $18,000 under the bug bounty program. Let me remind you that I also talked about IS researcher earned more than $2000000 on… Continue reading Researcher Found Three Bugs Allowing Hacking Amazon Kindle

The post Researcher Found Three Bugs Allowing Hacking Amazon Kindle appeared first on Gridinsoft Blog.

]]>
Researcher Yogev Bar-On from Israeli consulting firm Realmode Labs talked about his KindleDrip attack technique and three Amazon Kindle bugs (already fixed) that underlie it.

For discovery of these vulnerabilities the expert received $18,000 under the bug bounty program.

Let me remind you that I also talked about IS researcher earned more than $2000000 on HackerOne.

The first vulnerability in the KindleDrip exploit chain is related to the Send in Kindle feature, which allows users to send e-books in MOBI format to their device via email (Amazon creates a special mailbox at @ kindle.com for this).

By abusing this feature, it was possible to send a specially crafted e-book to the device that allows arbitrary code to be executed on the target Kindle.writes the expert.

Code execution became possible with a second library vulnerability that Kindle devices use to parse JPEG XR images. Exploiting the bug required the user to simply click on a link inside a book containing a malicious JPEG XR image, which would open a browser and run the attacker’s code with limited privileges.

Since even this was not enough for Bar-On, he found a third problem, which allowed him to escalate privileges and execute code with root rights, gaining full control over the target device.

Attackers can access device credentials and make purchases from the Kindle store using the victim’s credit card. Attackers can sell an e-book in a store and transfer money to their account. Only a confirmation letter will allow the victim to know about such a purchase,” says the expert.

It should be noted that the hacker could not gain access to the actual card numbers or passwords, since these types of data are not stored on the device. Instead, the attacker could obtain special tokens and use them to access the victim’s account.

All a hacker needs for such an attack is to know the email address of the future victim (often @ kindle.com is the same as the user’s regular email address) and convince him to click on the link inside the malicious e-book. Although the Send to Kindle feature allows sending books to the devices only from pre-approved addresses, the researcher writes that an attacker could simply use spoofing to do so.

A demonstration of the attack can be seen below:

Currently, these vulnerabilities have already been fixed. So, problems with code execution and privilege escalation were eliminated in December 2020 with the release of version 5.13.4. In addition, Amazon now sends verification links to email addresses that cannot be authenticated, and adds some characters to @kinle.com addresses to make them harder to guess.

The post Researcher Found Three Bugs Allowing Hacking Amazon Kindle appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/researcher-found-three-bugs-allowing-hacking-amazon-kindle/feed/ 0 5022