Task #13203

Task #13202: Huawei Pentest Remidiation

HUAWEI - H1 - Unencrypted Communications

Added by Nurul Athira Abdul Rahim about 2 years ago. Updated over 1 year ago.

Status:Closed - End of life cycleStart date:September 06, 2022
Priority:NormalDue date:September 12, 2022
Assignee:Rahmat Aina Nadia% Done:

100%

Category:PCI DSS - PentestSpent time:-
Target version:-

Description

Description :

The application allows users to connect to it over unencrypted connections. An attacker suitably positioned to view a legitimate user's network traffic could record and monitor their interactions with the application and obtain any information the user supplies. Furthermore, an attacker able to modify traffic could use the application as a platform for attacks against its users and third-party websites. Unencrypted connections have been exploited by ISPs and governments to track users, and to inject adverts and malicious JavaScript. Due to these concerns, web browser vendors are planning to visually flag unencrypted connections as hazardous.

To exploit this vulnerability, an attacker must be suitably positioned to eavesdrop on the victim's network traffic. This scenario typically occurs when a client communicates with the server over an insecure connection such as public Wi-Fi, or a corporate or home network that is shared with a compromised computer. Common defenses such as switched networks are not sufficient to prevent this. An attacker situated in the user's ISP or the application's hosting infrastructure could also perform this attack. Note that an advanced adversary could potentially target any connection made over the Internet's core infrastructure.

Please note that using a mixture of encrypted and unencrypted communications is an ineffective defense against active attackers, because they can easily remove references to encrypted resources when these references are transmitted over an unencrypted connection.

LGMS Solution :
The applications should use transport-level encryption (SSL/TLS) to protect all communications passing between the client and the server.

Penril Plan :
Testing using internal.
To provide path screenshot (BSNeBiz)

Capture.PNG (18.1 KB) Rahmat Aina Nadia, September 12, 2022 10:19

History

#1 Updated by Rahmat Aina Nadia about 2 years ago

  • File Capture.PNG added
  • Status changed from New - Begin Life Cycle to Finished Development
  • % Done changed from 0 to 100

#2 Updated by Rahmat Aina Nadia about 2 years ago

for Production APK, the HTTP communications and public IP address are not permitted and will give the server under maintenance result. Kindly refer the screenshot attached for the path information.

#3 Updated by Nurul Athira Abdul Rahim over 1 year ago

  • Status changed from Finished Development to Closed - End of life cycle

Deployed to SIT on 15/4/22
Deployed to UAT on 18/4/22

Confirmed by azyan on 23/3/23, now pending LGMS feedback and new testing cycle result.

Also available in: Atom PDF